summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2816.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc2816.txt')
-rw-r--r--doc/rfc/rfc2816.txt2635
1 files changed, 2635 insertions, 0 deletions
diff --git a/doc/rfc/rfc2816.txt b/doc/rfc/rfc2816.txt
new file mode 100644
index 0000000..6345103
--- /dev/null
+++ b/doc/rfc/rfc2816.txt
@@ -0,0 +1,2635 @@
+
+
+
+
+
+
+Network Working Group A. Ghanwani
+Request for Comments: 2816 Nortel Networks
+Category: Informational W. Pace
+ IBM
+ V. Srinivasan
+ CoSine Communications
+ A. Smith
+ Extreme Networks
+ M. Seaman
+ Telseon
+ May 2000
+
+
+ A Framework for Integrated Services
+ Over Shared and Switched IEEE 802 LAN Technologies
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+Abstract
+
+ This memo describes a framework for supporting IETF Integrated
+ Services on shared and switched LAN infrastructure. It includes
+ background material on the capabilities of IEEE 802 like networks
+ with regard to parameters that affect Integrated Services such as
+ access latency, delay variation and queuing support in LAN switches.
+ It discusses aspects of IETF's Integrated Services model that cannot
+ easily be accommodated in different LAN environments. It outlines a
+ functional model for supporting the Resource Reservation Protocol
+ (RSVP) in such LAN environments. Details of extensions to RSVP for
+ use over LANs are described in an accompanying memo [14]. Mappings
+ of the various Integrated Services onto IEEE 802 LANs are described
+ in another memo [13].
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 1]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Document Outline . . . . . . . . . . . . . . . . . . . . . 4
+ 3. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4
+ 4. Frame Forwarding in IEEE 802 Networks . . . . . . . . . . 5
+ 4.1. General IEEE 802 Service Model . . . . . . . . . . . 5
+ 4.2. Ethernet/IEEE 802.3 . . . . . . . . . . . . . . . . . 7
+ 4.3. Token Ring/IEEE 802.5 . . . . . . . . . . . . . . . . 8
+ 4.4. Fiber Distributed Data Interface . . . . . . . . . . 10
+ 4.5. Demand Priority/IEEE 802.12 . . . . . . . . . . . . . 10
+ 5. Requirements and Goals . . . . . . . . . . . . . . . . . . 11
+ 5.1. Requirements . . . . . . . . . . . . . . . . . . . . 11
+ 5.2. Goals . . . . . . . . . . . . . . . . . . . . . . . . 13
+ 5.3. Non-goals . . . . . . . . . . . . . . . . . . . . . . 14
+ 5.4. Assumptions . . . . . . . . . . . . . . . . . . . . . 14
+ 6. Basic Architecture . . . . . . . . . . . . . . . . . . . . 15
+ 6.1. Components . . . . . . . . . . . . . . . . . . . . . 15
+ 6.1.1. Requester Module . . . . . . . . . . . . . . 15
+ 6.1.2. Bandwidth Allocator . . . . . . . . . . . . . 16
+ 6.1.3. Communication Protocols . . . . . . . . . . . 16
+ 6.2. Centralized vs. Distributed Implementations . . . . 17
+ 7. Model of the Bandwidth Manager in a Network . . . . . . . 18
+ 7.1. End Station Model . . . . . . . . . . . . . . . . . . 19
+ 7.1.1. Layer 3 Client Model . . . . . . . . . . . . 19
+ 7.1.2. Requests to Layer 2 ISSLL . . . . . . . . . . 19
+ 7.1.3. At the Layer 3 Sender . . . . . . . . . . . . 20
+ 7.1.4. At the Layer 3 Receiver . . . . . . . . . . . 21
+ 7.2. Switch Model . . . . . . . . . . . . . . . . . . . . 22
+ 7.2.1. Centralized Bandwidth Allocator . . . . . . . 22
+ 7.2.2. Distributed Bandwidth Allocator . . . . . . . 23
+ 7.3. Admission Control . . . . . . . . . . . . . . . . . . 25
+ 7.4. QoS Signaling . . . . . . . . . . . . . . . . . . . . 26
+ 7.4.1. Client Service Definitions . . . . . . . . . 26
+ 7.4.2. Switch Service Definitions . . . . . . . . . 27
+ 8. Implementation Issues . . . . . . . . . . . . . . . . . . 28
+ 8.1. Switch Characteristics . . . . . . . . . . . . . . . 29
+ 8.2. Queuing . . . . . . . . . . . . . . . . . . . . . . . 30
+ 8.3. Mapping of Services to Link Level Priority . . . . . 31
+ 8.4. Re-mapping of Non-conforming Aggregated Flows . . . . 31
+ 8.5. Override of Incoming User Priority . . . . . . . . . 32
+ 8.6. Different Reservation Styles . . . . . . . . . . . . 32
+ 8.7. Receiver Heterogeneity . . . . . . . . . . . . . . . 33
+ 9. Network Topology Scenarios . . . . . . . . . . . . . . . 35
+ 9.1. Full Duplex Switched Networks . . . . . . . . . . . . 36
+ 9.2. Shared Media Ethernet Networks . . . . . . . . . . . 37
+ 9.3. Half Duplex Switched Ethernet Networks . . . . . . . 38
+ 9.4. Half Duplex Switched and Shared Token Ring Networks . 39
+
+
+
+Ghanwani, et al. Informational [Page 2]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ 9.5. Half Duplex and Shared Demand Priority Networks . . . 40
+ 10. Justification . . . . . . . . . . . . . . . . . . . . . . 42
+ 11. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 43
+ References . . . . . . . . . . . . . . . . . . . . . . . . . . 43
+ Security Considerations . . . . . . . . . . . . . . . . . . . 45
+ Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 45
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 46
+ Full Copyright Statement . . . . . . . . . . . . . . . . . . . 47
+
+1. Introduction
+
+ The Internet has traditionally provided support for best effort
+ traffic only. However, with the recent advances in link layer
+ technology, and with numerous emerging real time applications such as
+ video conferencing and Internet telephony, there has been much
+ interest for developing mechanisms which enable real time services
+ over the Internet. A framework for meeting these new requirements
+ was set out in RFC 1633 [8] and this has driven the specification of
+ various classes of network service by the Integrated Services working
+ group of the IETF, such as Controlled Load and Guaranteed Service
+ [6,7]. Each of these service classes is designed to provide certain
+ Quality of Service (QoS) to traffic conforming to a specified set of
+ parameters. Applications are expected to choose one of these classes
+ according to their QoS requirements. One mechanism for end stations
+ to utilize such services in an IP network is provided by a QoS
+ signaling protocol, the Resource Reservation Protocol (RSVP) [5]
+ developed by the RSVP working group of the IETF. The IEEE under its
+ Project 802 has defined standards for many different local area
+ network technologies. These all typically offer the same MAC layer
+ datagram service [1] to higher layer protocols such as IP although
+ they often provide different dynamic behavior characteristics -- it
+ is these that are important when considering their ability to support
+ real time services. Later in this memo we describe some of the
+ relevant characteristics of the different MAC layer LAN technologies.
+ In addition, IEEE 802 has defined standards for bridging multiple LAN
+ segments together using devices known as "MAC Bridges" or "Switches"
+ [2]. Recent work has also defined traffic classes, multicast
+ filtering, and virtual LAN capabilities for these devices [3,4].
+ Such LAN technologies often constitute the last hop(s) between users
+ and the Internet as well as being a primary building block for entire
+ campus networks. It is therefore necessary to provide standardized
+ mechanisms for using these technologies to support end-to-end real
+ time services. In order to do this, there must be some mechanism for
+ resource management at the data link layer. Resource management in
+ this context encompasses the functions of admission control,
+ scheduling, traffic policing, etc. The ISSLL (Integrated Services
+
+
+
+
+
+Ghanwani, et al. Informational [Page 3]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ over Specific Link Layers) working group in the IETF was chartered
+ with the purpose of exploring and standardizing such mechanisms for
+ various link layer technologies.
+
+2. Document Outline
+
+ This document is concerned with specifying a framework for providing
+ Integrated Services over shared and switched LAN technologies such as
+ Ethernet/IEEE 802.3, Token Ring/IEEE 802.5, FDDI, etc. We begin in
+ Section 4 with a discussion of the capabilities of various IEEE 802
+ MAC layer technologies. Section 5 lists the requirements and goals
+ for a mechanism capable of providing Integrated Services in a LAN.
+ The resource management functions outlined in Section 5 are provided
+ by an entity referred to as a Bandwidth Manager (BM). The
+ architectural model of the BM is described in Section 6 and its
+ various components are discussed in Section 7. Some implementation
+ issues with respect to link layer support for Integrated Services are
+ examined in Section 8. Section 9 discusses a taxonomy of topologies
+ for the LAN technologies under consideration with an emphasis on the
+ capabilities of each which can be leveraged for enabling Integrated
+ Services. This framework makes no assumptions about the topology at
+ the link layer. The framework is intended to be as exhaustive as
+ possible; this means that it is possible that all the functions
+ discussed may not be supportable by a particular topology or
+ technology, but this should not preclude the usage of this model for
+ it.
+
+3. Definitions
+
+ The following is a list of terms used in this and other ISSLL
+ documents.
+
+ - Link Layer or Layer 2 or L2: Data link layer technologies such as
+ Ethernet/IEEE 802.3 and Token Ring/IEEE 802.5 are referred to as
+ Layer 2 or L2.
+
+ - Link Layer Domain or Layer 2 Domain or L2 Domain: Refers to a set
+ of nodes and links interconnected without passing through a L3
+ forwarding function. One or more IP subnets can be overlaid on a
+ L2 domain.
+
+ - Layer 2 or L2 Devices: Devices that only implement Layer 2
+ functionality as Layer 2 or L2 devices. These include IEEE 802.1D
+ [2] bridges or switches.
+
+ - Internetwork Layer or Layer 3 or L3: Refers to Layer 3 of the ISO
+ OSI model. This memo is primarily concerned with networks that
+ use the Internet Protocol (IP) at this layer.
+
+
+
+Ghanwani, et al. Informational [Page 4]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ - Layer 3 Device or L3 Device or End Station: These include hosts
+ and routers that use L3 and higher layer protocols or application
+ programs that need to make resource reservations.
+
+ - Segment: A physical L2 segment that is shared by one or more
+ senders. Examples of segments include: (a) a shared Ethernet or
+ Token Ring wire resolving contention for media access using CSMA
+ or token passing; (b) a half duplex link between two stations or
+ switches; (c) one direction of a switched full duplex link.
+
+ - Managed Segment: A managed segment is a segment with a DSBM
+ (designated subnet bandwidth manager, see [14]) present and
+ responsible for exercising admission control over requests for
+ resource reservation. A managed segment includes those
+ interconnected parts of a shared LAN that are not separated by
+ DSBMs.
+
+ - Traffic Class: Refers to an aggregation of data flows which are
+ given similar service within a switched network.
+
+ - Subnet: Used in this memo to indicate a group of L3 devices
+ sharing a common L3 network address prefix along with the set of
+ segments making up the L2 domain in which they are located.
+
+ - Bridge/Switch: A Layer 2 forwarding device as defined by IEEE
+ 802.1D [2]. The terms bridge and switch are used synonymously in
+ this memo.
+
+4. Frame Forwarding in IEEE 802 Networks
+
+4.1. General IEEE 802 Service Model
+
+ The user_priority is a value associated with the transmission and
+ reception of all frames in the IEEE 802 service model. It is
+ supplied by the sender that is using the MAC service and is provided
+ along with the data to a receiver using the MAC service. It may or
+ may not be actually carried over the network. Token Ring/IEEE 802.5
+ carries this value encoded in its FC octet while basic Ethernet/IEEE
+ 802.3 does not carry it. IEEE 802.12 may or may not carry it
+ depending on the frame format in use. When the frame format in use
+ is IEEE 802.5, the user_priority is carried explicitly. When IEEE
+ 802.3 frame format is used, only the two levels of priority
+ (high/low) that are used to determine access priority can be
+ recovered. This is based on the value of priority encoded in the
+ start delimiter of the IEEE 802.3 frame.
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 5]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ NOTE: The original IEEE 802.1D standard [2] contains the
+ specifications for the operation of MAC bridges. This has recently
+ been extended to include support for traffic classes and dynamic
+ multicast filtering [3]. In this document, the reader should be
+ aware that references to the IEEE 802.1D standard refer to [3],
+ unless explicitly noted otherwise.
+
+ IEEE 802.1D [3] defines a consistent way for carrying the value of
+ the user_priority over a bridged network consisting of Ethernet,
+ Token Ring, Demand Priority, FDDI or other MAC layer media using an
+ extended frame format. The usage of user_priority is summarized
+ below. We refer the interested reader to the IEEE 802.1D
+ specification for further information.
+
+ If the user_priority is carried explicitly in packets, its utility is
+ as a simple label enabling packets within a data stream in different
+ classes to be discriminated easily by downstream nodes without having
+ to parse the packet in more detail.
+
+ Apart from making the job of desktop or wiring closet switches
+ easier, an explicit field means they do not have to change hardware
+ or software as the rules for classifying packets evolve; e.g. based
+ on new protocols or new policies. More sophisticated Layer 3
+ switches, perhaps deployed in the core of a network, may be able to
+ provide added value by performing packet classification more
+ accurately and, hence, utilizing network resources more efficiently
+ and providing better isolation between flows. This appears to be a
+ good economic choice since there are likely to be very many more
+ desktop/wiring closet switches in a network than switches requiring
+ Layer 3 functionality.
+
+ The IEEE 802 specifications make no assumptions about how
+ user_priority is to be used by end stations or by the network.
+ Although IEEE 802.1D defines static priority queuing as the default
+ mode of operation of switches that implement multiple queues, the
+ user_priority is really a priority only in a loose sense since it
+ depends on the number of traffic classes actually implemented by a
+ switch. The user_priority is defined as a 3 bit quantity with a
+ value of 7 representing the highest priority and a value of 0 as the
+ lowest. The general switch algorithm is as follows. Packets are
+ queued within a particular traffic class based on the received
+ user_priority, the value of which is either obtained directly from
+ the packet if an IEEE 802.1Q header or IEEE 802.5 network is used, or
+ is assigned according to some local policy. The queue is selected
+ based on a mapping from user_priority (0 through 7) onto the number
+ of available traffic classes. A switch may implement one or more
+ traffic classes. The advertised IntServ parameters and the switch's
+ admission control behavior may be used to determine the mapping from
+
+
+
+Ghanwani, et al. Informational [Page 6]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ user_priority to traffic classes within the switch. A switch is not
+ precluded from implementing other scheduling algorithms such as
+ weighted fair queuing and round robin.
+
+ IEEE 802.1D makes no recommendations about how a sender should select
+ the value for user_priority. One of the primary purposes of this
+ document is to propose such usage rules, and to discuss the
+ communication of the semantics of these values between switches and
+ end stations. In the remainder of this document we use the term
+ traffic class synonymously with user_priority.
+
+4.2. Ethernet/IEEE 802.3
+
+ There is no explicit traffic class or user_priority field carried in
+ Ethernet packets. This means that user_priority must be regenerated
+ at a downstream receiver or switch according to some defaults or by
+ parsing further into higher layer protocol fields in the packet.
+ Alternatively, IEEE 802.1Q encapsulation [4] may be used which
+ provides an explicit user_priority field on top of the basic MAC
+ frame format.
+
+ For the different IP packet encapsulations used over Ethernet/IEEE
+ 802.3, it will be necessary to adjust any admission control
+ calculations according to the framing and padding requirements as
+ shown in Table 1. Here, "ip_len" refers to the length of the IP
+ packet including its headers.
+
+ Table 1: Ethernet encapsulations
+
+ ---------------------------------------------------------------
+ Encapsulation Framing Overhead IP MTU
+ bytes/pkt bytes
+ ---------------------------------------------------------------
+ IP EtherType (ip_len<=46 bytes) 64-ip_len 1500
+ (1500>=ip_len>=46 bytes) 18 1500
+
+ IP EtherType over 802.1D/Q (ip_len<=42) 64-ip_len 1500*
+ (1500>=ip_len>=42 bytes) 22 1500*
+
+ IP EtherType over LLC/SNAP (ip_len<=40) 64-ip_len 1492
+ (1500>=ip_len>=40 bytes) 24 1492
+ ---------------------------------------------------------------
+
+ *Note that the packet length of an Ethernet frame using the IEEE
+ 802.1Q specification exceeds the current IEEE 802.3 maximum packet
+ length values by 4 bytes. The change of maximum MTU size for IEEE
+ 802.1Q frames is being accommodated by IEEE 802.3ac [21].
+
+
+
+
+Ghanwani, et al. Informational [Page 7]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+4.3. Token Ring/IEEE 802.5
+
+ The Token Ring standard [6] provides a priority mechanism that can be
+ used to control both the queuing of packets for transmission and the
+ access of packets to the shared media. The priority mechanisms are
+ implemented using bits within the Access Control (AC) and the Frame
+ Control (FC) fields of a LLC frame. The first three bits of the AC
+ field, the Token Priority bits, together with the last three bits of
+ the AC field, the Reservation bits, regulate which stations get
+ access to the ring. The last three bits of the FC field of a LLC
+ frame, the User Priority bits, are obtained from the higher layer in
+ the user_priority parameter when it requests transmission of a
+ packet. This parameter also establishes the Access Priority used by
+ the MAC. The user_priority value is conveyed end-to-end by the User
+ Priority bits in the FC field and is typically preserved through
+ Token Ring bridges of all types. In all cases, 0 is the lowest
+ priority.
+
+ Token Ring also uses a concept of Reserved Priority which relates to
+ the value of priority which a station uses to reserve the token for
+ its next transmission on the ring. When a free token is circulating,
+ only a station having an Access Priority greater than or equal to the
+ Reserved Priority in the token will be allowed to seize the token for
+ transmission. Readers are referred to [14] for further discussion of
+ this topic.
+
+ A Token Ring station is theoretically capable of separately queuing
+ each of the eight levels of requested user_priority and then
+ transmitting frames in order of priority. A station sets Reservation
+ bits according to the user_priority of frames that are queued for
+ transmission in the highest priority queue. This allows the access
+ mechanism to ensure that the frame with the highest priority
+ throughout the entire ring will be transmitted before any lower
+ priority frame. Annex I to the IEEE 802.5 Token Ring standard
+ recommends that stations send/relay frames as follows.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 8]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ Table 2: Recommended use of Token Ring User Priority
+
+ -------------------------------------
+ Application User Priority
+ -------------------------------------
+ Non-time-critical data 0
+ - 1
+ - 2
+ - 3
+ LAN management 4
+ Time-sensitive data 5
+ Real-time-critical data 6
+ MAC frames 7
+ -------------------------------------
+
+ To reduce frame jitter associated with high priority traffic, the
+ annex also recommends that only one frame be transmitted per token
+ and that the maximum information field size be 4399 octets whenever
+ delay sensitive traffic is traversing the ring. Most existing
+ implementations of Token Ring bridges forward all LLC frames with a
+ default access priority of 4. Annex I recommends that bridges
+ forward LLC frames that have a user_priority greater than 4 with a
+ reservation equal to the user_priority (although IEEE 802.1D [3]
+ permits network management override this behavior). The capabilities
+ provided by the Token Ring architecture, such User Priority and
+ Reserved Priority, can provide effective support for Integrated
+ Services flows that require QoS guarantees.
+
+ For the different IP packet encapsulations used over Token Ring/IEEE
+ 802.5, it will be necessary to adjust any admission control
+ calculations according to the framing requirements as shown in Table
+ 3.
+
+ Table 3: Token Ring encapsulations
+
+ ---------------------------------------------------------------
+ Encapsulation Framing Overhead IP MTU
+ bytes/pkt bytes
+ ---------------------------------------------------------------
+ IP EtherType over 802.1D/Q 29 4370*
+ IP EtherType over LLC/SNAP 25 4370*
+ ---------------------------------------------------------------
+
+ *The suggested MTU from RFC 1042 [13] is 4464 bytes but there are
+ issues related to discovering the maximum supported MTU between any
+ two points both within and between Token Ring subnets. The MTU
+ reported here is consistent with the IEEE 802.5 Annex I
+ recommendation.
+
+
+
+Ghanwani, et al. Informational [Page 9]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+4.4. Fiber Distributed Data Interface
+
+ The Fiber Distributed Data Interface (FDDI) standard [16] provides a
+ priority mechanism that can be used to control both the queuing of
+ packets for transmission and the access of packets to the shared
+ media. The priority mechanisms are implemented using similar
+ mechanisms to Token Ring described above. The standard also makes
+ provision for "Synchronous" data traffic with strict media access and
+ delay guarantees. This mode of operation is not discussed further
+ here and represents area within the scope of the ISSLL working group
+ that requires further work. In the remainder of this document, for
+ the discussion of QoS mechanisms, FDDI is treated as a 100 Mbps Token
+ Ring technology using a service interface compatible with IEEE 802
+ networks.
+
+4.5. Demand Priority/IEEE 802.12
+
+ IEEE 802.12 [19] is a standard for a shared 100 Mbps LAN. Data
+ packets are transmitted using either the IEEE 802.3 or IEEE 802.5
+ frame format. The MAC protocol is called Demand Priority. Its main
+ characteristics with respect to QoS are the support of two service
+ priority levels, normal priority and high priority, and the order of
+ service for each of these. Data packets from all network nodes (end
+ hosts and bridges/switches) are served using a simple round robin
+ algorithm.
+
+ If the IEEE 802.3 frame format is used for data transmission then the
+ user_priority is encoded in the starting delimiter of the IEEE 802.12
+ data packet. If the IEEE 802.5 frame format is used then the
+ user_priority is additionally encoded in the YYY bits of the FC field
+ in the IEEE 802.5 packet header (see also Section 4.3). Furthermore,
+ the IEEE 802.1Q encapsulation with its own user_priority field may
+ also be applied in IEEE 802.12 networks. In all cases, switches are
+ able to recover any user_priority supplied by a sender.
+
+ The same rules apply for IEEE 802.12 user_priority mapping in a
+ bridge as with other media types. The only additional information is
+ that normal priority is used by default for user_priority values 0
+ through 4 inclusive, and high priority is used for user_priority
+ levels 5 through 7. This ensures that the default Token Ring
+ user_priority level of 4 for IEEE 802.5 bridges is mapped to normal
+ priority on IEEE 802.12 segments.
+
+ The medium access in IEEE 802.12 LANs is deterministic. The Demand
+ Priority mechanism ensures that, once the normal priority service has
+ been preempted, all high priority packets have strict priority over
+ packets with normal priority. In the event that a normal priority
+ packet has been waiting at the head of line of a MAC transmit queue
+
+
+
+Ghanwani, et al. Informational [Page 10]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ for a time period longer than PACKET_PROMOTION (200 - 300 ms) [19],
+ its priority is automatically promoted to high priority. Thus, even
+ normal priority packets have a maximum guaranteed access time to the
+ medium.
+
+ Integrated Services can be built on top of the IEEE 802.12 medium
+ access mechanism. When combined with admission control and bandwidth
+ enforcement mechanisms, delay guarantees as required for a Guaranteed
+ Service can be provided without any changes to the existing IEEE
+ 802.12 MAC protocol.
+
+ Since the IEEE 802.12 standard supports the IEEE 802.3 and IEEE 802.5
+ frame formats, the same framing overhead as reported in Sections 4.2
+ and 4.3 must be considered in the admission control computations for
+ IEEE 802.12 links.
+
+5. Requirements and Goals
+
+ This section discusses the requirements and goals which should drive
+ the design of an architecture for supporting Integrated Services over
+ LAN technologies. The requirements refer to functions and features
+ which must be supported, while goals refer to functions and features
+ which are desirable, but are not an absolute necessity. Many of the
+ requirements and goals are driven by the functionality supported by
+ Integrated Services and RSVP.
+
+5.1. Requirements
+
+ - Resource Reservation: The mechanism must be capable of reserving
+ resources on a single segment or multiple segments and at
+ bridges/switches connecting them. It must be able to provide
+ reservations for both unicast and multicast sessions. It should
+ be possible to change the level of reservation while the session
+ is in progress.
+
+ - Admission Control: The mechanism must be able to estimate the
+ level of resources necessary to meet the QoS requested by the
+ session in order to decide whether or not the session can be
+ admitted. For the purpose of management, it is useful to provide
+ the ability to respond to queries about availability of resources.
+ It must be able to make admission control decisions for different
+ types of services such as Guaranteed Service, Controlled Load,
+ etc.
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 11]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ - Flow Separation and Scheduling: It is necessary to provide a
+ mechanism for traffic flow separation so that real time flows can
+ be given preferential treatment over best effort flows. Packets
+ of real time flows can then be isolated and scheduled according to
+ their service requirements.
+
+ - Policing/Shaping: Traffic must be shaped and/or policed by end
+ stations (workstations, routers) to ensure conformance to
+ negotiated traffic parameters. Shaping is the recommended
+ behavior for traffic sources. A router initiating an ISSLL
+ session must have implemented traffic control mechanisms according
+ to the IntServ requirements which would ensure that all flows sent
+ by the router are in conformance. The ISSLL mechanisms at the
+ link layer rely heavily on the correct implementation of
+ policing/shaping mechanisms at higher layers by devices capable of
+ doing so. This is necessary because bridges and switches are not
+ typically capable of maintaining per flow state which would be
+ required to check flows for conformance. Policing is left as an
+ option for bridges and switches, which if implemented, may be used
+ to enforce tighter control over traffic flows. This issue is
+ further discussed in Section 8.
+
+ - Soft State: The mechanism must maintain soft state information
+ about the reservations. This means that state information must
+ periodically be refreshed if the reservation is to be maintained;
+ otherwise the state information and corresponding reservations
+ will expire after some pre-specified interval.
+
+ - Centralized or Distributed Implementation: In the case of a
+ centralized implementation, a single entity manages the resources
+ of the entire subnet. This approach has the advantage of being
+ easier to deploy since bridges and switches may not need to be
+ upgraded with additional functionality. However, this approach
+ scales poorly with geographical size of the subnet and the number
+ of end stations attached. In a fully distributed implementation,
+ each segment will have a local entity managing its resources.
+ This approach has better scalability than the former. However, it
+ requires that all bridges and switches in the network support new
+ mechanisms. It is also possible to have a semi-distributed
+ implementation where there is more than one entity, each managing
+ the resources of a subset of segments and bridges/switches within
+ the subnet. Ideally, implementation should be flexible; i.e. a
+ centralized approach may be used for small subnets and a
+ distributed approach can be used for larger subnets. Examples of
+ centralized and distributed implementations are discussed in
+ Section 6.
+
+
+
+
+
+Ghanwani, et al. Informational [Page 12]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ - Scalability: The mechanism and protocols should have a low
+ overhead and should scale to the largest receiver groups likely to
+ occur within a single link layer domain.
+
+ - Fault Tolerance and Recovery: The mechanism must be able to
+ function in the presence of failures; i.e. there should not be a
+ single point of failure. For instance, in a centralized
+ implementation, some mechanism must be specified for back-up and
+ recovery in the event of failure.
+
+ - Interaction with Existing Resource Management Controls: The
+ interaction with existing infrastructure for resource management
+ needs to be specified. For example, FDDI has a resource
+ management mechanism called the "Synchronous Bandwidth Manager".
+ The mechanism must be designed so that it takes advantage of, and
+ specifies the interaction with, existing controls where available.
+
+5.2. Goals
+
+ - Independence from higher layer protocols: The mechanism should,
+ as far as possible, be independent of higher layer protocols such
+ as RSVP and IP. Independence from RSVP is desirable so that it can
+ interwork with other reservation protocols such as ST2 [10].
+ Independence from IP is desirable so that it can interwork with
+ other network layer protocols such as IPX, NetBIOS, etc.
+
+ - Receiver heterogeneity: this refers to multicast communication
+ where different receivers request different levels of service.
+ For example, in a multicast group with many receivers, it is
+ possible that one of the receivers desires a lower delay bound
+ than the others. A better delay bound may be provided by
+ increasing the amount of resources reserved along the path to that
+ receiver while leaving the reservations for the other receivers
+ unchanged. In its most complex form, receiver heterogeneity
+ implies the ability to simultaneously provide various levels of
+ service as requested by different receivers. In its simplest
+ form, receiver heterogeneity will allow a scenario where some of
+ the receivers use best effort service and those requiring service
+ guarantees make a reservation. Receiver heterogeneity, especially
+ for the reserved/best effort scenario, is a very desirable
+ function. More details on supporting receiver heterogeneity are
+ provided in Section 8.
+
+ - Support for different filter styles: It is desirable to provide
+ support for the different filter styles defined by RSVP such as
+ fixed filter, shared explicit and wildcard. Some of the issues
+ with respect to supporting such filter styles in the link layer
+ domain are examined in Section 8.
+
+
+
+Ghanwani, et al. Informational [Page 13]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ - Path Selection: In source routed LAN technologies such as Token
+ Ring/IEEE 802.5, it may be useful for the mechanism to incorporate
+ the function of path selection. Using an appropriate path
+ selection mechanism may optimize utilization of network resources.
+
+5.3. Non-goals
+
+ This document describes service mappings onto existing IEEE and ANSI
+ defined standard MAC layers and uses standard MAC layer services as
+ in IEEE 802.1 bridging. It does not attempt to make use of or
+ describe the capabilities of other proprietary or standard MAC layer
+ protocols although it should be noted that published work regarding
+ MAC layers suitable for QoS mappings exists. These are outside the
+ scope of the ISSLL working group charter.
+
+5.4. Assumptions
+
+ This framework assumes that typical subnetworks that are concerned
+ about QoS will be "switch rich"; i.e. most communication between end
+ stations using integrated services support is expected to pass
+ through at least one switch. The mechanisms and protocols described
+ will be trivially extensible to communicating systems on the same
+ shared medium, but it is important not to allow problem
+ generalization which may complicate the targeted practical
+ application to switch rich LAN topologies. There have also been
+ developments in the area of MAC enhancements to ensure delay
+ deterministic access on network links e.g. IEEE 802.12 [19] and also
+ proprietary schemes.
+
+ Although we illustrate most examples for this model using RSVP as the
+ upper layer QoS signaling protocol, there are actually no real
+ dependencies on this protocol. RSVP could be replaced by some other
+ dynamic protocol, or the requests could be made by network management
+ or other policy entities. The SBM signaling protocol [14], which is
+ based upon RSVP, is designed to work seamlessly in the architecture
+ described in this memo.
+
+ There may be a heterogeneous mix of switches with different
+ capabilities, all compliant with IEEE 802.1D [2,3], but implementing
+ varied queuing and forwarding mechanisms ranging from simple systems
+ with two queues per port and static priority scheduling, to more
+ complex systems with multiple queues using WFQ or other algorithms.
+
+ The problem is decomposed into smaller independent parts which may
+ lead to sub-optimal use of the network resources but we contend that
+ such benefits are often equivalent to very small improvement in
+ network efficiency in a LAN environment. Therefore, it is a goal
+ that the switches in a network operate using a much simpler set of
+
+
+
+Ghanwani, et al. Informational [Page 14]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ information than the RSVP engine in a router. In particular, it is
+ assumed that such switches do not need to implement per flow queuing
+ and policing (although they are not precluded from doing so).
+
+ A fundamental assumption of the IntServ model is that flows are
+ isolated from each other throughout their transit across a network.
+ Intermediate queuing nodes are expected to shape or police the
+ traffic to ensure conformance to the negotiated traffic flow
+ specification. In the architecture proposed here for mapping to
+ Layer 2, we diverge from that assumption in the interest of
+ simplicity. The policing/shaping functions are assumed to be
+ implemented in end stations. In some LAN environments, it is
+ reasonable to assume that end stations are trusted to adhere to their
+ negotiated contracts at the inputs to the network, and that we can
+ afford to over-allocate resources during admission control to
+ compensate for the inevitable packet jitter/bunching introduced by
+ the switched network itself. This divergence has some implications
+ on the types of receiver heterogeneity that can be supported and the
+ statistical multiplexing gains that may be exploited, especially for
+ Controlled Load flows. This is discussed in Section 8.7 of this
+ document.
+
+6. Basic Architecture
+
+ The functional requirements described in Section 5 will be performed
+ by an entity which we refer to as the Bandwidth Manager (BM). The BM
+ is responsible for providing mechanisms for an application or higher
+ layer protocol to request QoS from the network. For architectural
+ purposes, the BM consists of the following components.
+
+6.1. Components
+
+6.1.1. Requester Module
+
+ The Requester Module (RM) resides in every end station in the subnet.
+ One of its functions is to provide an interface between applications
+ or higher layer protocols such as RSVP, ST2, SNMP, etc. and the BM.
+ An application can invoke the various functions of the BM by using
+ the primitives for communication with the RM and providing it with
+ the appropriate parameters. To initiate a reservation, in the link
+ layer domain, the following parameters must be passed to the RM: the
+ service desired (Guaranteed Service or Controlled Load), the traffic
+ descriptors contained in the TSpec, and an RSpec specifying the
+ amount of resources to be reserved [9]. More information on these
+ parameters may be found in the relevant Integrated Services documents
+ [6,7,8,9]. When RSVP is used for signaling at the network layer,
+ this information is available and needs to be extracted from the RSVP
+ PATH and RSVP RESV messages (See [5] for details). In addition to
+
+
+
+Ghanwani, et al. Informational [Page 15]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ these parameters, the network layer addresses of the end points must
+ be specified. The RM must then translate the network layer addresses
+ to link layer addresses and convert the request into an appropriate
+ format which is understood by other components of the BM responsible
+ admission control. The RM is also responsible for returning the
+ status of requests processed by the BM to the invoking application or
+ higher layer protocol.
+
+6.1.2. Bandwidth Allocator
+
+ The Bandwidth Allocator (BA) is responsible for performing admission
+ control and maintaining state about the allocation of resources in
+ the subnet. An end station can request various services, e.g.
+ bandwidth reservation, modification of an existing reservation,
+ queries about resource availability, etc. These requests are
+ processed by the BA. The communication between the end station and
+ the BA takes place through the RM. The location of the BA will depend
+ largely on the implementation method. In a centralized
+ implementation, the BA may reside on a single station in the subnet.
+ In a distributed implementation, the functions of the BA may be
+ distributed in all the end stations and bridges/switches as
+ necessary. The BA is also responsible for deciding how to label
+ flows, e.g. based on the admission control decision, the BA may
+ indicate to the RM that packets belonging to a particular flow be
+ tagged with some priority value which maps to the appropriate traffic
+ class.
+
+6.1.3. Communication Protocols
+
+ The protocols for communication between the various components of the
+ BM system must be specified. These include the following:
+
+ - Communication between the higher layer protocols and the RM: The
+ BM must define primitives for the application to initiate
+ reservations, query the BA about available resources, change
+ change or delete reservations, etc. These primitives could be
+ implemented as an API for an application to invoke functions of
+ the BM via the RM.
+
+ - Communication between the RM and the BA: A signaling mechanism
+ must be defined for the communication between the RM and the BA.
+ This protocol will specify the messages which must be exchanged
+ between the RM and the BA in order to service various requests by
+ the higher layer entity.
+
+ - Communication between peer BAs: If there is more than one BA in
+ the subnet, a means must be specified for inter-BA communication.
+ Specifically, the BAs must be able to decide among themselves
+
+
+
+Ghanwani, et al. Informational [Page 16]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ about which BA would be responsible for which segments and bridges
+ or switches. Further, if a request is made for resource
+ reservation along the domain of multiple BAs, the BAs must be able
+ to handle such a scenario correctly. Inter-BA communication will
+ also be responsible for back-up and recovery in the event of
+ failure.
+
+6.2. Centralized vs. Distributed Implementations
+
+ Example scenarios are provided showing the location of the components
+ of the bandwidth manager in centralized and fully distributed
+ implementations. Note that in either case, the RM must be present in
+ all end stations that need to make reservations. Essentially,
+ centralized or distributed refers to the implementation of the BA,
+ the component responsible for resource reservation and admission
+ control. In the figures below, "App" refers to the application
+ making use of the BM. It could either be a user application, or a
+ higher layer protocol process such as RSVP.
+
+ +---------+
+ .-->| BA |<--.
+ / +---------+ \
+ / .-->| Layer 2 |<--. \
+ / / +---------+ \ \
+ / / \ \
+ / / \ \
+ +---------+ / / \ \ +---------+
+ | App |<----- /-/---------------------------\-\----->| App |
+ +---------+ / / \ \ +---------+
+ | RM |<----. / \ .--->| RM |
+ +---------+ / +---------+ +---------+ \ +---------+
+ | Layer 2 |<------>| Layer 2 |<------>| Layer 2 |<------>| Layer 2 |
+ +---------+ +---------+ +---------+ +---------+
+
+ RSVP Host/ Intermediate Intermediate RSVP Host/
+ Router Bridge/Switch Bridge/Switch Router
+
+ Figure 1: Bandwidth Manager with centralized Bandwidth Allocator
+
+ Figure 1 shows a centralized implementation where a single BA is
+ responsible for admission control decisions for the entire subnet.
+ Every end station contains a RM. Intermediate bridges and switches in
+ the network need not have any functions of the BM since they will not
+ be actively participating in admission control. The RM at the end
+ station requesting a reservation initiates communication with its BA.
+ For larger subnets, a single BA may not be able to handle the
+ reservations for the entire subnet. In that case it would be
+ necessary to deploy multiple BAs, each managing the resources of a
+
+
+
+Ghanwani, et al. Informational [Page 17]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ non-overlapping subset of segments. In a centralized implementation,
+ the BA must have some knowledge of the Layer 2 topology of the subnet
+ e.g., link layer spanning tree information, in order to be able to
+ reserve resources on appropriate segments. Without this topology
+ information, the BM would have to reserve resources on all segments
+ for all flows which, in a switched network, would lead to very
+ inefficient utilization of resources.
+
+ +---------+ +---------+
+ | App |<-------------------------------------------->| App |
+ +---------+ +---------+ +---------+ +---------+
+ | RM/BA |<------>| BA |<------>| BA |<------>| RM/BA |
+ +---------+ +---------+ +---------+ +---------+
+ | Layer 2 |<------>| Layer 2 |<------>| Layer 2 |<------>| Layer 2 |
+ +---------+ +---------+ +---------+ +---------+
+
+ RSVP Host/ Intermediate Intermediate RSVP Host/
+ Router Bridge/Switch Bridge/Switch Router
+
+ Figure 2: Bandwidth Manager with fully
+ distributed Bandwidth Allocator
+
+ Figure 2 depicts the scenario of a fully distributed bandwidth
+ manager. In this case, all devices in the subnet have BM
+ functionality. All the end hosts are still required to have a RM. In
+ addition, all stations actively participate in admission control.
+ With this approach, each BA would need only local topology
+ information since it is responsible for the resources on segments
+ that are directly connected to it. This local topology information,
+ such as a list of ports active on the spanning tree and which unicast
+ addresses are reachable from which ports, is readily available in
+ today's switches. Note that in the figures above, the arrows between
+ peer layers are used to indicate logical connectivity.
+
+7. Model of the Bandwidth Manager in a Network
+
+ In this section we describe how the model above fits with the
+ existing IETF Integrated Services model of IP hosts and routers.
+ First, we describe Layer 3 host and router implementations. Next, we
+ describe how the model is applied in Layer 2 switches. Throughout we
+ indicate any differences between centralized and distributed
+ implementations. Occasional references are made to terminology from
+ the Subnet Bandwidth Manager specification [14].
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 18]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+7.1. End Station Model
+
+7.1.1. Layer 3 Client Model
+
+ We assume the same client model as IntServ and RSVP where we use the
+ term "client" to mean the entity handling QoS in the Layer 3 device
+ at each end of a Layer 2 Domain. In this model, the sending client
+ is responsible for local admission control and packet scheduling onto
+ its link in accordance with the negotiated service. As with the
+ IntServ model, this involves per flow scheduling with possible
+ traffic shaping/policing in every such originating node.
+
+ For now, we assume that the client runs an RSVP process which
+ presents a session establishment interface to applications, provides
+ signaling over the network, programs a scheduler and classifier in
+ the driver, and interfaces to a policy control module. In
+ particular, RSVP also interfaces to a local admission control module
+ which is the focus of this section.
+
+ The following figure, reproduced from the RSVP specification, depicts
+ the RSVP process in sending hosts.
+
+ +-----------------------------+
+ | +-------+ +-------+ | RSVP
+ | |Appli- | | RSVP <------------------->
+ | | cation<--> | |
+ | | | |process| +-----+|
+ | +-+-----+ | +->Polcy||
+ | | +--+--+-+ |Cntrl||
+ | |data | | +-----+|
+ |===|===========|==|==========|
+ | | +--------+ | +-----+|
+ | | | | +--->Admis||
+ | +-V--V-+ +---V----+ |Cntrl||
+ | |Class-| | Packet | +-----+|
+ | | ifier|==>Schedulr|===================>
+ | +------+ +--------+ | data
+ +-----------------------------+
+
+ Figure 3: RSVP in Sending Hosts
+
+7.1.2. Requests to Layer 2 ISSLL
+
+ The local admission control entity within a client is responsible for
+ mapping Layer 3 session establishment requests into Layer 2
+ semantics.
+
+
+
+
+
+Ghanwani, et al. Informational [Page 19]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ The upper layer entity makes a request, in generalized terms to ISSLL
+ of the form:
+
+ "May I reserve for traffic with <traffic characteristic> with
+ <performance requirements> from <here> to <there> and how should I
+ label it?"
+
+ where
+
+ <traffic characteristic> = Sender Tspec (e.g. bandwidth, burstiness,
+ MTU)
+ <performance requirements> = FlowSpec (e.g. latency, jitter bounds)
+ <here> = IP address(es)
+ <there> = IP address(es) - may be multicast
+
+7.1.3. At the Layer 3 Sender
+
+ The ISSLL functionality in the sender is illustrated in Figure 4.
+
+ The functions of the Requester Module may be summarized as follows:
+
+ - Maps the endpoints of the conversation to Layer 2 addresses in the
+ LAN, so that the client can determine what traffic is going where.
+ This function probably makes reference to the ARP protocol cache
+ for unicast or performs an algorithmic mapping for multicast
+ destinations.
+
+ - Communicates with any local Bandwidth Allocator module for local
+ admission control decisions.
+
+ - Formats a SBM request to the network with the mapped addresses and
+ flow/filter specs.
+
+ - Receives a response from the network and reports the admission
+ control decision to the higher layer entity, along with any
+ negotiated modifications to the session parameters.
+
+ - Saves any returned user_priority to be associated with this
+ session in a "802 header" table. This will be used when
+ constructing the Layer 2 headers for future data packets belonging
+ to this session. This table might, for example, be indexed by the
+ RSVP flow identifier.
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 20]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ from IP from RSVP
+ +----|------------|------------+
+ | +--V----+ +---V---+ |
+ | | Addr <---> | | SBM signaling
+ | |mapping| |Request|<----------------------->
+ | +---+---+ |Module | |
+ | | | | |
+ | +---+---+ | | |
+ | | 802 <---> | |
+ | | header| +-+-+-+-+ |
+ | +--+----+ / | | |
+ | | / | | +-----+ |
+ | | +-----+ | +->|Band-| |
+ | | | | |width| |
+ | +--V-V-+ +-----V--+ |Alloc| |
+ | |Class-| | Packet | +-----+ |
+ | | ifier|==>Schedulr|=========================>
+ | +------+ +--------+ | data
+ +------------------------------+
+
+ Figure 4: ISSLL in a Sending End Station
+
+ The Bandwidth Allocator (BA) component is only present when a
+ distributed BA model is implemented. When present, its function is
+ basically to apply local admission control for the outgoing link
+ bandwidth and driver's queuing resources.
+
+7.1.4. At the Layer 3 Receiver
+
+ The ISSLL functionality in the receiver is simpler and is illustrated
+ in Figure 5.
+
+ The functions of the Requester Module may be summarized as follows:
+
+ - Handles any received SBM protocol indications.
+
+ - Communicates with any local BA for local admission control
+ decisions.
+
+ - Passes indications up to RSVP if OK.
+
+ - Accepts confirmations from RSVP and relays them back via SBM
+ signaling towards the requester.
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 21]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ to RSVP to IP
+ ^ ^
+ +----|------------|------+
+ | +--+----+ | |
+ SBM signaling | |Request| +---+---+ |
+ <-------------> |Module | | Strip | |
+ | +--+---++ |802 hdr| |
+ | | \ +---^---+ |
+ | +--v----+\ | |
+ | | Band- | \ | |
+ | | width| \ | |
+ | | Alloc | . | |
+ | +-------+ | | |
+ | +------+ +v---+----+ |
+ data | |Class-| | Packet | |
+ <==============>| ifier|==>|Scheduler| |
+ | +------+ +---------+ |
+ +------------------------+
+
+ Figure 5: ISSLL in a Receiving End Station
+
+ - May program a receive classifier and scheduler, if used, to
+ identify traffic classes of received packets and accord them
+ appropriate treatment e.g., reservation of buffers for particular
+ traffic classes.
+
+ - Programs the receiver to strip away link layer header information
+ from received packets.
+
+ The Bandwidth Allocator, present only in a distributed implementation
+ applies local admission control to see if a request can be supported
+ with appropriate local receive resources.
+
+7.2. Switch Model
+
+7.2.1. Centralized Bandwidth Allocator
+
+ Where a centralized Bandwidth Allocator model is implemented,
+ switches do not take part in the admission control process.
+ Admission control is implemented by a centralized BA, e.g., a "Subnet
+ Bandwidth Manager" (SBM) as described in [14]. This centralized BA
+ may actually be co-located with a switch but its functions would not
+ necessarily then be closely tied with the switch's forwarding
+ functions as is the case with the distributed BA described below.
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 22]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+7.2.2. Distributed Bandwidth Allocator
+
+ The model of Layer 2 switch behavior described here uses the
+ terminology of the SBM protocol as an example of an admission control
+ protocol. The model is equally applicable when other mechanisms,
+ e.g. static configuration or network management, are in use for
+ admission control. We define the following entities within the
+ switch:
+
+ - Local Admission Control Module: One of these on each port
+ accounts for the available bandwidth on the link attached to that
+ port. For half duplex links, this involves taking account of the
+ resources allocated to both transmit and receive flows. For full
+ duplex links, the input port accountant's task is trivial.
+
+ - Input SBM Module: One instance on each port performs the
+ "network" side of the signaling protocol for peering with clients
+ or other switches. It also holds knowledge about the mappings of
+ IntServ classes to user_priority.
+
+ - SBM Propagation Module: Relays requests that have passed
+ admission control at the input port to the relevant output ports'
+ SBM modules. This will require access to the switch's forwarding
+ table (Layer-2 "routing table" cf. RSVP model) and port spanning
+ tree state.
+
+ - Output SBM Module: Forwards requests to the next Layer 2 or Layer
+ 3 hop.
+
+ - Classifier, Queue and Scheduler Module: The functions of this
+ module are basically as described by the Forwarding Process of
+ IEEE 802.1D (see Section 3.7 of [3]). The Classifier module
+ identifies the relevant QoS information from incoming packets and
+ uses this, together with the normal bridge forwarding database, to
+ decide at which output port and traffic class to enqueue the
+ packet. Different types of switches will use different techniques
+ for flow identification (see Section 8.1). In IEEE 802.1D
+ switches this information is the regenerated user_priority
+ parameter which has already been decoded by the receiving MAC
+ service and potentially remapped by the forwarding process (see
+ Section 3.7.3 of [3]). This does not preclude more sophisticated
+ classification rules such as the classification of individual
+ IntServ flows. The Queue and Scheduler implement the
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 23]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ output queues for ports and provide the algorithm for servicing
+ the queues for transmission onto the output link in order to
+ provide the promised IntServ service. Switches will implement one
+ or more output queues per port and all will implement at least a
+ basic static priority dequeuing algorithm as their default, in
+ accordance with IEEE 802.1D.
+
+ - Ingress Traffic Class Mapping and Policing Module: Its functions
+ are as described in IEEE 802.1D Section 3.7. This optional module
+ may police the data within traffic classes for conformance to the
+ negotiated parameters, and may discard packets or re-map the
+ user_priority. The default behavior is to pass things through
+ unchanged.
+
+ - Egress Traffic Class Mapping Module: Its functions are as
+ described in IEEE 802.1D Section 3.7. This optional module may
+ perform re-mapping of traffic classes on a per output port basis.
+ The default behavior is to pass things through unchanged.
+
+ Figure 6 shows all of the modules in an ISSLL enabled switch. The
+ ISSLL model is a superset of the IEEE 802.1D bridge model.
+
+ +-------------------------------+
+ SBM signaling | +-----+ +------+ +------+ | SBM signaling
+ <------------------>| IN |<->| SBM |<->| OUT |<---------------->
+ | | SBM | | prop.| | SBM | |
+ | +-++--+ +---^--+ /----+-+ |
+ | / | | / | |
+ ______________| / | | | | +-------------+
+ | \ /+--V--+ | | +--V--+ / |
+ | \ ____/ |Local| | | |Local| / |
+ | \ / |Admis| | | |Admis| / |
+ | \/ |Cntrl| | | |Cntrl| / |
+ | +-----V+\ +-----+ | | +-----+ /+-----+ |
+ | |traff | \ +---+--+ +V-------+ / |egrss| |
+ | |class | \ |Filter| |Queue & | / |traff| |
+ | |map & |=====|==========>|Data- |=| Packet |=|===>|class| |
+ | |police| | | base| |Schedule| | |map | |
+ | +------+ | +------+ +--------+ | +-+---+ |
+ +----^---------+-------------------------------+------|------+
+ data in | |data out
+ ========+ +========>
+
+ Figure 6: ISSLL in a Switch
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 24]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+7.3. Admission Control
+
+ On receipt of an admission control request, a switch performs the
+ following actions, again using SBM as an example. The behavior is
+ different depending on whether the "Designated SBM" for this segment
+ is within this switch or not. See [14] for a more detailed
+ specification of the DSBM/SBM actions.
+
+ - If the ingress SBM is the "Designated SBM" for this link, it
+ either translates any received user_priority or selects a Layer 2
+ traffic class which appears compatible with the request and whose
+ use does not violate any administrative policies in force. In
+ effect, it matches the requested service with the available
+ traffic classes and chooses the "best" one. It ensures that, if
+ this reservation is successful, the value of user_priority
+ corresponding to that traffic class is passed back to the client.
+
+ - The ingress DSBM observes the current state of allocation of
+ resources on the input port/link and then determines whether the
+ new resource allocation from the mapped traffic class can be
+ accommodated. The request is passed to the reservation propagator
+ if accepted.
+
+ - If the ingress SBM is not the "Designated SBM" for this link then
+ it directly passes the request on to the reservation propagator.
+
+ - The reservation propagator relays the request to the bandwidth
+ accountants on each of the switch's outbound links to which this
+ reservation would apply. This implies an interface to
+ routing/forwarding database.
+
+ - The egress bandwidth accountant observes the current state of
+ allocation of queuing resources on its outbound port and bandwidth
+ on the link itself and determines whether the new allocation can
+ be accommodated. Note that this is only a local decision at this
+ switch hop; further Layer 2 hops through the network may veto the
+ request as it passes along.
+
+ - The request, if accepted by this switch, is propagated on each
+ output link selected. Any user_priority described in the
+ forwarded request must be translated according to any egress
+ mapping table.
+
+ - If accepted, the switch must notify the client of the
+ user_priority to be used for packets belonging to that flow.
+ Again, this is an optimistic approach assuming that admission
+ control succeeds; downstream switches may refuse the request.
+
+
+
+
+Ghanwani, et al. Informational [Page 25]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ - If this switch wishes to reject the request, it can do so by
+ notifying the client that originated the request by means of its
+ Layer 2 address.
+
+7.4. QoS Signaling
+
+ The mechanisms described in this document make use of a signaling
+ protocol for devices to communicate their admission control requests
+ across the network. The service definitions to be provided by such a
+ protocol e.g. [14] are described below. We illustrate the
+ primitives and information that need to be exchanged with such a
+ signaling protocol entity. In all of the examples, appropriate
+ delete/cleanup mechanisms will also have to be provided for tearing
+ down established sessions.
+
+7.4.1. Client Service Definitions
+
+ The following interfaces can be identified from Figures 4 and 5.
+
+ - SBM <-> Address Mapping
+
+ This is a simple lookup function which may require ARP protocol
+ interactions or an algorithmic mapping. The Layer 2 addresses are
+ needed by SBM for inclusion in its signaling messages to avoid
+ requiring that switches participating in the signaling have Layer
+ 3 information to perform the mapping.
+
+ l2_addr = map_address( ip_addr )
+
+ - SBM <-> Session/Link Layer Header
+
+ This is for notifying the transmit path of how to add Layer 2
+ header information, e.g. user_priority values to the traffic of
+ each outgoing flow. The transmit path will provide the
+ user_priority value when it requests a MAC layer transmit
+ operation for each packet. The user_priority is one of the
+ parameters passed in the packet transmit primitive defined by the
+ IEEE 802 service model.
+
+ bind_l2_header( flow_id, user_priority )
+
+ - SBM <-> Classifier/Scheduler
+
+ This is for notifying transmit classifier/scheduler of any
+ additional Layer 2 information associated with scheduling the
+ transmission of a packet flow. This primitive may be unused in
+ some implementations or it may be used, for example, to provide
+ information to a transmit scheduler that is performing per traffic
+
+
+
+Ghanwani, et al. Informational [Page 26]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ class scheduling in addition to the per flow scheduling required
+ by IntServ; the Layer 2 header may be a pattern (in addition to
+ the FilterSpec) to be used to identify the flow's traffic.
+
+ bind_l2schedulerinfo( flow_id, , l2_header, traffic_class )
+
+ - SBM <-> Local Admission Control
+
+ This is used for applying local admission control for a session
+ e.g. is there enough transmit bandwidth still uncommitted for
+ this new session? Are there sufficient receive buffers? This
+ should commit the necessary resources if it succeeds. It will be
+ necessary to release these resources at a later stage if the
+ admission control fails at a subsequent node. This call would be
+ made, for example, by a segment's Designated SBM.
+
+ status = admit_l2session( flow_id, Tspec, FlowSpec )
+
+ - SBM <-> RSVP
+
+ This is outlined above in Section 7.1.2 and fully described in
+ [14].
+
+ - Management Interfaces
+
+ Some or all of the modules described by this model will also
+ require configuration management. It is expected that details of
+ the manageable objects will be specified by future work in the
+ ISSLL WG.
+
+7.4.2. Switch Service Definitions
+
+ The following interfaces are identified from Figure 6.
+
+ - SBM <-> Classifier
+
+ This is for notifying the receive classifier of how to match
+ incoming Layer 2 information with the associated traffic class.
+ It may in some cases consist of a set of read only default
+ mappings.
+
+ bind_l2classifierinfo( flow_id, l2_header, traffic_class )
+
+ - SBM <-> Queue and Packet Scheduler
+
+ This is for notifying transmit scheduler of additional Layer 2
+ information associated with a given traffic class. It may be
+ unused in some cases (see discussion in previous section).
+
+
+
+Ghanwani, et al. Informational [Page 27]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ bind_l2schedulerinfo( flow_id, l2_header, traffic_class )
+
+ - SBM <-> Local Admission Control
+
+ Same as for the host discussed above.
+
+ - SBM <-> Traffic Class Map and Police
+
+ Optional configuration of any user_priority remapping that might
+ be implemented on ingress to and egress from the ports of a
+ switch. For IEEE 802.1D switches, it is likely that these
+ mappings will have to be consistent across all ports.
+
+ bind_l2ingressprimap( inport, in_user_pri, internal_priority )
+ bind_l2egressprimap( outport, internal_priority, out_user_pri )
+
+ Optional configuration of any Layer 2 policing function to be
+ applied on a per class basis to traffic matching the Layer 2
+ header. If the switch is capable of per flow policing then
+ existing IntServ/RSVP models will provide a service definition for
+ that configuration.
+
+ bind_l2policing( flow_id, l2_header, Tspec, FlowSpec )
+
+ - SBM <-> Filtering Database
+
+ SBM propagation rules need access to the Layer 2 forwarding
+ database to determine where to forward SBM messages. This is
+ analogous to RSRR interface in Layer 3 RSVP.
+
+ output_portlist = lookup_l2dest( l2_addr )
+
+ - Management Interfaces
+
+ Some or all of the modules described by this model will also
+ require configuration management. It is expected that details of
+ the manageable objects will be specified by future work in the
+ ISSLL working group.
+
+8. Implementation Issues
+
+ As stated earlier, the Integrated Services working group has defined
+ various service classes offering varying degrees of QoS guarantees.
+ Initial effort will concentrate on enabling the Controlled Load [6]
+ and Guaranteed Service classes [7]. The Controlled Load service
+ provides a loose guarantee, informally stated as "the same as best
+ effort would be on an unloaded network". The Guaranteed Service
+ provides an upper bound on the transit delay of any packet. The
+
+
+
+Ghanwani, et al. Informational [Page 28]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ extent to which these services can be supported at the link layer
+ will depend on many factors including the topology and technology
+ used. Some of the mapping issues are discussed below in light of the
+ emerging link layer standards and the functions supported by higher
+ layer protocols. Considering the limitations of some of the
+ topologies, it may not be possible to satisfy all the requirements
+ for Integrated Services on a given topology. In such cases, it is
+ useful to consider providing support for an approximation of the
+ service which may suffice in most practical instances. For example,
+ it may not be feasible to provide policing/shaping at each network
+ element (bridge/switch) as required by the Controlled Load
+ specification. But if this task is left to the end stations, a
+ reasonably good approximation to the service can be obtained.
+
+8.1. Switch Characteristics
+
+ There are many LAN bridges/switches with varied capabilities for
+ supporting QoS. We discuss below the various kinds of devices that
+ that one may expect to find in a LAN environment.
+
+ The most basic bridge is one which conforms to the IEEE 802.1D
+ specification of 1993 [2]. This device has a single queue per output
+ port, and uses the spanning tree algorithm to eliminate topology
+ loops. Networks constructed from this kind of device cannot be
+ expected to provide service guarantees of any kind because of the
+ complete lack of traffic isolation.
+
+ The next level of bridges/switches are those which conform to the
+ more recently revised IEEE 802.1D specification [3]. They include
+ support for queuing up to eight traffic classes separately. The level
+ of traffic isolation provided is coarse because all flows
+ corresponding to a particular traffic class are aggregated. Further,
+ it is likely that more than one priority will map to a traffic class
+ depending on the number of queues implemented in the switch. It
+ would be difficult for such a device to offer protection against
+ misbehaving flows. The scope of multicast traffic may be limited by
+ using GMRP to only those segments which are on the path to interested
+ receivers.
+
+ A next step above these devices are bridges/switches which implement
+ optional parts of the IEEE 802.1D specification such as mapping the
+ received user_priority to some internal set of canonical values on a
+ per-input-port basis. It may also support the mapping of these
+ internal canonical values onto transmitted user_priority on a per-
+ output-port basis. With these extra capabilities, network
+ administrators can perform mapping of traffic classes between
+ specific pairs of ports, and in doing so gain more control over
+ admission of traffic into the protected classes.
+
+
+
+Ghanwani, et al. Informational [Page 29]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ Other entirely optional features that some bridges/switches may
+ support include classification of IntServ flows using fields in the
+ network layer header, per-flow policing and/or reshaping which is
+ essential for supporting Guaranteed Service, and more sophisticated
+ scheduling algorithms such as variants of weighted fair queuing to
+ limit the bandwidth consumed by a traffic class. Note that it is
+ advantageous to perform flow isolation and for all network elements
+ to police each flow in order to support the Controlled Load and
+ Guaranteed Service.
+
+8.2. Queuing
+
+ Connectionless packet networks in general, and LANs in particular,
+ work today because of scaling choices in network provisioning.
+ Typically, excess bandwidth and buffering is provisioned in the
+ network to absorb the traffic sourced by higher layer protocols,
+ often sufficient to cause their transmission windows to run out on a
+ statistical basis, so that network overloads are rare and transient
+ and the expected loading is very low.
+
+ With the advent of time-critical traffic such over-provisioning has
+ become far less easy to achieve. Time-critical frames may be queued
+ for annoyingly long periods of time behind temporary bursts of file
+ transfer traffic, particularly at network bottleneck points, e.g. at
+ the 100 Mbps to 10 Mbps transition that might occur between the riser
+ to the wiring closet and the final link to the user from a desktop
+ switch. In this case, however, if it is known a priori (either by
+ application design, on the basis of statistics, or by administrative
+ control) that time-critical traffic is a small fraction of the total
+ bandwidth, it suffices to give it strict priority over the non-time-
+ critical traffic. The worst case delay experienced by the time-
+ critical traffic is roughly the maximum transmission time of a
+ maximum length non-time-critical frame -- less than a millisecond for
+ 10 Mbps Ethernet, and well below the end to end delay budget based on
+ human perception times.
+
+ When more than one priority service is to be offered by a network
+ element e.g. one which supports both Controlled Load as well as
+ Guaranteed Service, the requirements for the scheduling discipline
+ become more complex. In order to provide the required isolation
+ between the service classes, it will probably be necessary to queue
+ them separately. There is then an issue of how to service the queues
+ which requires a combination of admission control and more
+ intelligent queuing disciplines. As with the service specifications
+ themselves, the specification of queuing algorithms is beyond the
+ scope of this document.
+
+
+
+
+
+Ghanwani, et al. Informational [Page 30]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+8.3. Mapping of Services to Link Level Priority
+
+ The number of traffic classes supported and access methods of the
+ technology under consideration will determine how many and what
+ services may be supported. Native Token Ring/IEEE 802.5, for
+ instance, supports eight priority levels which may be mapped to one
+ or more traffic classes. Ethernet/IEEE 802.3 has no support for
+ signaling priorities within frames. However, the IEEE 802 standards
+ committee has recently developed a new standard for bridges/switches
+ related to multimedia traffic expediting and dynamic multicast
+ filtering [3]. A packet format for carrying a user_priority field on
+ all IEEE 802 LAN media types is now defined in [4]. These standards
+ allow for up to eight traffic classes on all media. The
+ user_priority bits carried in the frame are mapped to a particular
+ traffic class within a bridge/switch. The user_priority is signaled
+ on an end-to-end basis, unless overridden by bridge/switch
+ management. The traffic class that is used by a flow should depend
+ on the quality of service desired and whether the reservation is
+ successful or not. Therefore, a sender should use the user_priority
+ value which maps to the best effort traffic class until told
+ otherwise by the BM. The BM will, upon successful completion of
+ resource reservation, specify the value of user_priority to be used
+ by the sender for that session's data. An accompanying memo [13]
+ addresses the issue of mapping the various Integrated Services to
+ appropriate traffic classes.
+
+8.4. Re-mapping of Non-conforming Aggregated Flows
+
+ One other topic under discussion in the IntServ context is how to
+ handle the traffic for data flows from sources that exceed their
+ negotiated traffic contract with the network. An approach that shows
+ some promise is to treat such traffic with "somewhat less than best
+ effort" service in order to protect traffic that is normally given
+ "best effort" service from having to back off. Best effort traffic
+ is often adaptive, using TCP or other congestion control algorithms,
+ and it would be unfair to penalize those flows due to badly behaved
+ traffic from reserved flows which are often set up by non-adaptive
+ applications.
+
+ A possible solution might be to assign normal best effort traffic to
+ one user_priority and to label excess non-conforming traffic as a
+ lower user_priority although the re-ordering problems that might
+ arise from doing this may make this solution undesirable,
+ particularly if the flows are using TCP. For this reason the
+ controlled load service recommends dropping excess traffic, rather
+ than re-mapping to a lower priority. This is further discussed
+ below.
+
+
+
+
+Ghanwani, et al. Informational [Page 31]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+8.5. Override of Incoming User Priority
+
+ In some cases, a network administrator may not trust the
+ user_priority values contained in packets from a source and may wish
+ to map these into some more suitable set of values. Alternatively,
+ due perhaps to equipment limitations or transition periods, the
+ user_priority values may need to be re-mapped as the data flows
+ to/from different regions of a network.
+
+ Some switches may implement such a function on input that maps
+ received user_priority to some internal set of values. This function
+ is provided by a table known in IEEE 802.1D as the User Priority
+ Regeneration Table (Table 3-1 in [3]). These values can then be
+ mapped using an output table described above onto outgoing
+ user_priority values. These same mappings must also be used when
+ applying admission control to requests that use the user_priority
+ values (see e.g. [14]). More sophisticated approaches are also
+ possible where a device polices traffic flows and adjusts their
+ onward user_priority based on their conformance to the admitted
+ traffic flow specifications.
+
+8.6. Different Reservation Styles
+
+ In the figure above, SW is a bridge/switch in the link layer domain.
+ S1, S2, S3, R1 and R2 are end stations which are members of a group
+ associated with the same RSVP flow. S1, S2 and S3 are upstream end
+ stations. R1 and R2 are the downstream end stations which receive
+ traffic from all the senders. RSVP allows receivers R1 and R2 to
+ specify reservations which can apply to: (a) one specific sender
+ only (fixed filter); (b) any of two or more explicitly specified
+ senders (shared explicit filter); and (c) any sender in the group
+ (shared wildcard filter). Support for the fixed filter style is
+ straightforward; a separate reservation is made for the traffic from
+ each of the senders. However, support for the other two filter
+ styles has implications regarding policing; i.e. the merged flow
+ from the different senders must be policed so that they conform to
+ traffic parameters specified in the filter's RSpec. This scenario is
+ further complicated if the services requested by R1 and R2 are
+ different. Therefore, in the absence of policing within
+ bridges/switches, it may be possible to support only fixed filter
+ reservations at the link layer.
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 32]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ +-----+ +-----+ +-----+
+ | S1 | | S2 | | S3 |
+ +-----+ +-----+ +-----+
+ | | |
+ | v |
+ | +-----+ |
+ +--------->| SW |<---------+
+ +-----+
+ | |
+ +----+ +----+
+ | |
+ v V
+ +-----+ +-----+
+ | R1 | | R2 |
+ +-----+ +-----+
+
+ Figure 7: Illustration of filter styles
+
+8.7. Receiver Heterogeneity
+
+ At Layer 3, the IntServ model allows heterogeneous receivers for
+ multicast flows where different branches of a tree can have different
+ types of reservations for a given multicast destination. It also
+ supports the notion that trees may have some branches with reserved
+ flows and some using best effort service. If we were to treat a
+ Layer 2 subnet as a single network element as defined in [8], then
+ all of the branches of the distribution tree that lie within the
+ subnet could be assumed to require the same QoS treatment and be
+ treated as an atomic unit as regards admission control, etc. With
+ this assumption, the model and protocols already defined by IntServ
+ and RSVP already provide sufficient support for multicast
+ heterogeneity. Note, however, that an admission control request may
+ well be rejected because just one link in the subnet is
+ oversubscribed leading to rejection of the reservation request for
+ the entire subnet.
+
+ As an example, consider Figure 8, SW is a Layer 2 device
+ (bridge/switch) participating in resource reservation, S is the
+ upstream source end station and R1 and R2 are downstream end station
+ receivers. R1 would like to make a reservation for the flow while R2
+ would like to receive the flow using best effort service. S sends
+ RSVP PATH messages which are multicast to both R1 and R2. R1 sends
+ an RSVP RESV message to S requesting the reservation of resources.
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 33]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ +-----+
+ | S |
+ +-----+
+ |
+ v
+ +-----+ +-----+ +-----+
+ | R1 |<-----| SW |----->| R2 |
+ +-----+ +-----+ +-----+
+
+ Figure 8: Example of receiver heterogeneity
+
+ If the reservation is successful at Layer 2, the frames addressed to
+ the group will be categorized in the traffic class corresponding to
+ the service requested by R1. At SW, there must be some mechanism
+ which forwards the packet providing service corresponding to the
+ reserved traffic class at the interface to R1 while using the best
+ effort traffic class at the interface to R2. This may involve
+ changing the contents of the frame itself, or ignoring the frame
+ priority at the interface to R2.
+
+ Another possibility for supporting heterogeneous receivers would be
+ to have separate groups with distinct MAC addresses, one for each
+ class of service. By default, a receiver would join the "best
+ effort" group where the flow is classified as best effort. If the
+ receiver makes a reservation successfully, it can be transferred to
+ the group for the class of service desired. The dynamic multicast
+ filtering capabilities of bridges and switches implementing the IEEE
+ 802.1D standard would be a very useful feature in such a scenario. A
+ given flow would be transmitted only on those segments which are on
+ the path between the sender and the receivers of that flow. The
+ obvious disadvantage of such an approach is that the sender needs to
+ send out multiple copies of the same packet corresponding to each
+ class of service desired thus potentially duplicating the traffic on
+ a portion of the distribution tree.
+
+ The above approaches would provide very sub-optimal utilization of
+ resources given the expected size and complexity of the Layer 2
+ subnets. Therefore, it is desirable to enable switches to apply QoS
+ differently on different egress branches of a tree that divide at
+ that switch.
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 34]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ IEEE 802.1D specifies a basic model for multicast whereby a switch
+ makes multicast forwarding decisions based on the destination
+ address. This would produce a list of output ports to which the
+ packet should be forwarded. In its default mode, such a switch would
+ use the user_priority value in received packets, or a value
+ regenerated on a per input port basis in the absence of an explicit
+ value, to enqueue the packets at each output port. Any IEEE 802.1D
+ switch which supports multiple traffic classes can support this
+ operation.
+
+ If a switch selects per port output queues based only on the incoming
+ user_priority, as described by IEEE 802.1D, it must treat all
+ branches of all multicast sessions within that user_priority class
+ with the same queuing mechanism. Receiver heterogeneity is then not
+ possible and this could well lead to the failure of an admission
+ control request for the whole multicast session due to a single link
+ being oversubscribed. Note that in the Layer 2 case as distinct from
+ the Layer 3 case with RSVP/IntServ, the option of having some
+ receivers getting the session with the requested QoS and some getting
+ it best effort does not exist as basic IEEE 802.1 switches are unable
+ to re-map the user_priority on a per link basis. This could become
+ an issue with heavy use of dynamic multicast sessions. If a switch
+ were to implement a separate user_priority mapping at each output
+ port, then, in some cases, reservations can use a different traffic
+ class on different paths that branch at such a switch in order to
+ provide multiple receivers with different QoS. This is possible if
+ all flows within a traffic class at the ingress to a switch egress in
+ the same traffic class on a port. For example, traffic may be
+ forwarded using user_priority 4 on one branch where receivers have
+ performed admission control and as user_priority 0 on ones where they
+ have not. We assume that per user_priority queuing without taking
+ account of input or output ports is the minimum standard
+ functionality for switches in a LAN environment (IEEE 802.1D) but
+ that more functional Layer 2 or even Layer 3 switches (i.e. routers)
+ can be used if even more flexible forms of heterogeneity are
+ considered necessary to achieve more efficient resource utilization.
+ The behavior of Layer 3 switches in this context is already well
+ standardized by the IETF.
+
+9. Network Topology Scenarios
+
+ The extent to which service guarantees can be provided by a network
+ depend to a large degree on the ability to provide the key functions
+ of flow identification and scheduling in addition to admission
+ control and policing. This section discusses some of the
+ capabilities of the LAN technologies under consideration and provides
+ a taxonomy of possible topologies emphasizing the capabilities of
+ each with regard to supporting the above functions. For the
+
+
+
+Ghanwani, et al. Informational [Page 35]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ technologies considered here, the basic topology of a LAN may be
+ shared, switched half duplex or switched full duplex. In the shared
+ topology, multiple senders share a single segment. Contention for
+ media access is resolved using protocols such as CSMA/CD in Ethernet
+ and token passing in Token Ring and FDDI. Switched half duplex, is
+ essentially a shared topology with the restriction that there are
+ only two transmitters contending for resources on any segment.
+ Finally, in a switched full duplex topology, a full bandwidth path is
+ available to the transmitter at each end of the link at all times.
+ Therefore, in this topology, there is no need for any access control
+ mechanism such as CSMA/CD or token passing as there is no contention
+ between the transmitters. Obviously, this topology provides the best
+ QoS capabilities. Another important element in the discussion of
+ topologies is the presence or absence of support for multiple traffic
+ classes. These were discussed earlier in Section 4.1. Depending on
+ the basic topology used and the ability to support traffic classes,
+ we identify six scenarios as follows:
+
+ 1. Shared topology without traffic classes.
+ 2. Shared topology with traffic classes.
+ 3. Switched half duplex topology without traffic classes.
+ 4. Switched half duplex topology with traffic classes.
+ 5. Switched full duplex topology without traffic classes.
+ 6. Switched full duplex topology with traffic classes.
+
+ There is also the possibility of hybrid topologies where two or more
+ of the above coexist. For instance, it is possible that within a
+ single subnet, there are some switches which support traffic classes
+ and some which do not. If the flow in question traverses both kinds
+ of switches in the network, the least common denominator will
+ prevail. In other words, as far as that flow is concerned, the
+ network is of the type corresponding to the least capable topology
+ that is traversed. In the following sections, we present these
+ scenarios in further detail for some of the different IEEE 802
+ network types with discussion of their abilities to support the
+ IntServ services.
+
+9.1. Full Duplex Switched Networks
+
+ On a full duplex switched LAN, the MAC protocol is unimportant as as
+ access is concerned, but must be factored into the characterization
+ parameters advertised by the device since the access latency is equal
+ to the time required to transmit the largest packet. Approximate
+ values for the characteristics on various media are provided in the
+ following tables. These delays should be also be considered in the
+ context of the speed of light delay which is approximately 400 ns for
+ typical 100 m UTP links and 7 us for typical 2 km multimode fiber
+ links.
+
+
+
+Ghanwani, et al. Informational [Page 36]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ Table 4: Full duplex switched media access latency
+
+ --------------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ --------------------------------------------------
+ Ethernet 10 Mbps 1.2 ms 1.2 ms
+ 100 Mbps 120 us 120 us
+ 1 Gbps 12 us 12 us
+ Token Ring 4 Mbps 9 ms 9 ms
+ 16 Mbps 9 ms 9 ms
+ FDDI 100 Mbps 360 us 8.4 ms
+ Demand Priority 100 Mbps 120 us 120 us
+ --------------------------------------------------
+
+ Full duplex switched network topologies offer good QoS capabilities
+ for both Controlled Load and Guaranteed Service when supported by
+ suitable queuing strategies in the switches.
+
+9.2. Shared Media Ethernet Networks
+
+ Thus far, we have not discussed the difficulty of dealing with
+ allocation on a single shared CSMA/CD segment. As soon as any
+ CSMA/CD algorithm is introduced the ability to provide any form of
+ Guaranteed Service is seriously compromised in the absence of any
+ tight coupling between the multiple senders on the link. There are a
+ number of reasons for not offering a better solution to this problem.
+
+ Firstly, we do not believe this is a truly solvable problem as it
+ would require changes to the MAC protocol. IEEE 802.1 has examined
+ research showing disappointing simulation results for performance
+ guarantees on shared CSMA/CD Ethernet without MAC enhancements.
+ There have been proposals for enhancements to the MAC layer
+ protocols, e.g. BLAM and enhanced flow control in IEEE 802.3.
+ However, any solution involving an enhanced software MAC running
+ above the traditional IEEE 802.3 MAC, or other proprietary MAC
+ protocols, is outside the scope of the ISSLL working group and this
+ document. Secondly, we are not convinced that it is really an
+ interesting problem. While there will be end stations on shared
+ segments for some time to come, the number of deployed switches is
+ steadily increasing relative to the number of stations on shared
+ segments. This trend is proceeding to the point where it may be
+ satisfactory to have a solution which assumes that any network
+ communication requiring resource reservations will take place through
+ at least one switch or router. Put another way, the easiest upgrade
+ to existing Layer 2 infrastructure for QoS support is the
+ installation of segment switching. Only when this has been done is
+ it worthwhile to investigate more complex solutions involving
+
+
+
+Ghanwani, et al. Informational [Page 37]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ admission control. Thirdly, the core of campus networks typically
+ consists of solutions based on switches rather than on repeated
+ segments. There may be special circumstances in the future, e.g.
+ Gigabit buffered repeaters, but the characteristics of these devices
+ are different from existing CSMA/CD repeaters anyway.
+
+ Table 5: Shared Ethernet media access latency
+
+ --------------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ --------------------------------------------------
+ Ethernet 10 Mbps 1.2 ms unbounded
+ 100 Mbps 120 us unbounded
+ 1 Gbps 12 us unbounded
+ --------------------------------------------------
+
+9.3. Half Duplex Switched Ethernet Networks
+
+ Many of the same arguments for sub optimal support of Guaranteed
+ Service on shared media Ethernet also apply to half duplex switched
+ Ethernet. In essence, this topology is a medium that is shared
+ between at least two senders contending for packet transmission.
+ Unless these are tightly coupled and cooperative, there is always the
+ chance that the best effort traffic of one will interfere with the
+ reserved traffic of the other. Dealing with such a coupling would
+ require some form of modification to the MAC protocol.
+
+ Not withstanding the above argument, half duplex switched topologies
+ do seem to offer the chance to provide Controlled Load service. With
+ the knowledge that there are exactly two potential senders that are
+ both using prioritization for their Controlled Load traffic over best
+ effort flows, and with admission control having been done for those
+ flows based on that knowledge, the media access characteristics while
+ not deterministic are somewhat predictable. This is probably a close
+ enough useful approximation to the Controlled Load service.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 38]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ Table 6: Half duplex switched Ethernet media access latency
+
+ ------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ ------------------------------------------
+ Ethernet 10 Mbps 1.2 ms unbounded
+ 100 Mbps 120 us unbounded
+ 1 Gbps 12 us unbounded
+ ------------------------------------------
+
+9.4. Half Duplex Switched and Shared Token Ring Networks
+
+ In a shared Token Ring network, the network access time for high
+ priority traffic at any station is bounded and is given by
+ (N+1)*THTmax, where N is the number of stations sending high priority
+ traffic and THTmax is the maximum token holding time [14]. This
+ assumes that network adapters have priority queues so that
+ reservation of the token is done for traffic with the highest
+ priority currently queued in the adapter. It is easy to see that
+ access times can be improved by reducing N or THTmax. The
+ recommended default for THTmax is 10 ms [6]. N is an integer from 2
+ to 256 for a shared ring and 2 for a switched half duplex topology.
+ A similar analysis applies for FDDI.
+
+ Table 7: Half duplex switched and shared Token
+ Ring media access latency
+ ----------------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ ----------------------------------------------------
+ Token Ring 4/16 Mbps shared 9 ms 2570 ms
+ 4/16 Mbps switched 9 ms 30 ms
+ FDDI 100 Mbps 360 us 8 ms
+ ----------------------------------------------------
+
+ Given that access time is bounded, it is possible to provide an upper
+ bound for end-to-end delays as required by Guaranteed Service
+ assuming that traffic of this class uses the highest priority
+ allowable for user traffic. The actual number of stations that send
+ traffic mapped into the same traffic class as Guaranteed Service may
+ vary over time but, from an admission control standpoint, this value
+ is needed a priori. The admission control entity must therefore use
+ a fixed value for N, which may be the total number of stations on the
+ ring or some lower value if it is desired to keep the offered delay
+ guarantees smaller. If the value of N used is lower than the total
+ number of stations on the ring, admission control must ensure that
+ the number of stations sending high priority traffic never exceeds
+
+
+
+Ghanwani, et al. Informational [Page 39]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ this number. This approach allows admission control to estimate
+ worst case access delays assuming that all of the N stations are
+ sending high priority data even though, in most cases, this will mean
+ that delays are significantly overestimated.
+
+ Assuming that Controlled Load flows use a traffic class lower than
+ that used by Guaranteed Service, no upper bound on access latency can
+ be provided for Controlled Load flows. However, Controlled Load
+ flows will receive better service than best effort flows.
+
+ Note that on many existing shared Token Rings, bridges transmit
+ frames using an Access Priority (see Section 4.3) value of 4
+ irrespective of the user_priority carried in the frame control field
+ of the frame. Therefore, existing bridges would need to be
+ reconfigured or modified before the above access time bounds can
+ actually be used.
+
+9.5. Half Duplex and Shared Demand Priority Networks
+
+ In IEEE 802.12 networks, communication between end nodes and hubs and
+ between the hubs themselves is based on the exchange of link control
+ signals. These signals are used to control access to the shared
+ medium. If a hub, for example, receives a high priority request
+ while another hub is in the process of serving normal priority
+ requests, then the service of the latter hub can effectively be
+ preempted in order to serve the high priority request first. After
+ the network has processed all high priority requests, it resumes the
+ normal priority service at the point in the network at which it was
+ interrupted.
+
+ The network access time for high priority packets is basically the
+ time needed to preempt normal priority network service. This access
+ time is bounded and it depends on the physical layer and on the
+ topology of the shared network. The physical layer has a significant
+ impact when operating in half duplex mode as, e.g. when used across
+ unshielded twisted pair cabling (UTP) links, because link control
+ signals cannot be exchanged while a packet is transmitted over the
+ link. Therefore the network topology has to be considered since, in
+ larger shared networks, the link control signals must potentially
+ traverse several links and hubs before they can reach the hub which
+ has the network control function. This may delay the preemption of
+ the normal priority service and hence increase the upper bound that
+ may be guaranteed.
+
+ Upper bounds on the high priority access time are given below for a
+ UTP physical layer and a cable length of 100 m between all end nodes
+ and hubs using a maximum propagation delay of 570 ns as defined in
+
+
+
+
+Ghanwani, et al. Informational [Page 40]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ [19]. These values consider the worst case signaling overhead and
+ assume the transmission of maximum sized normal priority data packets
+ while the normal priority service is being preempted.
+
+ Table 8: Half duplex switched Demand Priority UTP access latency
+
+ ------------------------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ ------------------------------------------------------------
+ Demand Priority 100 Mbps, 802.3 pkt, UTP 120 us 254 us
+ 802.5 pkt, UTP 360 us 733 us
+ ------------------------------------------------------------
+
+ Shared IEEE 802.12 topologies can be classified using the hub
+ cascading level "N". The simplest topology is the single hub network
+ (N = 1). For a UTP physical layer, a maximum cascading level of N =
+ 5 is supported by the standard. Large shared networks with many
+ hundreds of nodes may be built with a level 2 topology. The
+ bandwidth manager could be informed about the actual cascading level
+ by network management mechanisms and can use this information in its
+ admission control algorithms.
+
+ In contrast to UTP, the fiber optic physical layer operates in dual
+ simplex mode. Upper bounds for the high priority access time are
+ given below for 2 km multimode fiber links with a propagation delay
+ of 10 us.
+
+ For shared media with distances of up to 2 km between all end nodes
+ and hubs, the IEEE 802.12 standard allows a maximum cascading level
+ of 2. Higher levels of cascaded topologies are supported but require
+ a reduction of the distances [15].
+
+ The bounded access delay and deterministic network access allow the
+ support of service commitments required for Guaranteed Service and
+ Controlled Load, even on shared media topologies. The support of
+ just two priority levels in 802.12, however, limits the number of
+ services that can simultaneously be implemented across the network.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 41]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ Table 9: Shared Demand Priority UTP access latency
+
+ ----------------------------------------------------------------
+ Type Speed Max Pkt Max Access Topology
+ Length Latency
+ ----------------------------------------------------------------
+ Demand Priority 100 Mbps, 802.3 pkt 120 us 262 us N = 1
+ 120 us 554 us N = 2
+ 120 us 878 us N = 3
+ 120 us 1.24 ms N = 4
+ 120 us 1.63 ms N = 5
+
+ Demand Priority 100 Mbps, 802.5 pkt 360 us 722 us N = 1
+ 360 us 1.41 ms N = 2
+ 360 us 2.32 ms N = 3
+ 360 us 3.16 ms N = 4
+ 360 us 4.03 ms N = 5
+ -----------------------------------------------------------------
+
+ Table 10: Half duplex switched Demand Priority
+ fiber access latency
+ -------------------------------------------------------------
+ Type Speed Max Pkt Max Access
+ Length Latency
+ -------------------------------------------------------------
+ Demand Priority 100 Mbps, 802.3 pkt, fiber 120 us 139 us
+ 802.5 pkt, fiber 360 us 379 us
+ -------------------------------------------------------------
+
+ Table 11: Shared Demand Priority fiber access latency
+
+ ---------------------------------------------------------------
+ Type Speed Max Pkt Max Access Topology
+ Length Latency
+ ---------------------------------------------------------------
+ Demand Priority 100 Mbps, 802.3 pkt 120 us 160 us N = 1
+ 120 us 202 us N = 2
+
+ Demand Priority 100 Mbps, 802.5 pkt 360 us 400 us N = 1
+ 360 us 682 us N = 2
+ ---------------------------------------------------------------
+
+10. Justification
+
+ An obvious concern is the complexity of this model. It essentially
+ does what RSVP already does at Layer 3, so why do we think we can do
+ better by reinventing the solution to this problem at Layer 2?
+
+
+
+
+Ghanwani, et al. Informational [Page 42]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ The key is that there are a number of simple Layer 2 scenarios that
+ cover a considerable portion of the real QoS problems that will
+ occur. A solution that covers the majority of problems at
+ significantly lower cost is beneficial. Full RSVP/IntServ with per
+ flow queuing in strategically positioned high function switches or
+ routers may be needed to completely resolve all issues, but devices
+ implementing the architecture described in herein will allow for a
+ significantly simpler network.
+
+11. Summary
+
+ This document has specified a framework for providing Integrated
+ Services over shared and switched LAN technologies. The ability to
+ provide QoS guarantees necessitates some form of admission control
+ and resource management. The requirements and goals of a resource
+ management scheme for subnets have been identified and discussed. We
+ refer to the entire resource management scheme as a Bandwidth
+ Manager. Architectural considerations were discussed and examples
+ were provided to illustrate possible implementations of a Bandwidth
+ Manager. Some of the issues involved in mapping the services from
+ higher layers to the link layer have also been discussed.
+ Accompanying memos from the ISSLL working group address service
+ mapping issues [13] and provide a protocol specification for the
+ Bandwidth Manager protocol [14] based on the requirements and goals
+ discussed in this document.
+
+References
+
+ [1] IEEE Standards for Local and Metropolitan Area Networks:
+ Overview and Architecture, ANSI/IEEE Std 802, 1990.
+
+ [2] ISO/IEC 10038 Information technology - Telecommunications and
+ information exchange between systems - Local area networks -
+ Media Access Control (MAC) Bridges, (also ANSI/IEEE Std 802.1D-
+ 1993), 1993.
+
+ [3] ISO/IEC 15802-3 Information technology - Telecommunications and
+ information exchange between systems - Local and metropolitan
+ area networks - Common specifications - Part 3: Media Access
+ Control (MAC) bridges (also ANSI/IEEE Std 802.1D-1998), 1998.
+
+ [4] IEEE Standards for Local and Metropolitan Area Networks:
+ Virtual Bridged Local Area Networks, IEEE Std 802.1Q-1998, 1998.
+
+ [5] Braden, B., Zhang, L., Berson, S., Herzog, S. and S. Jamin,
+ "Resource Reservation Protocol (RSVP) - Version 1 Functional
+ Specification", RFC 2205, September 1997.
+
+
+
+
+Ghanwani, et al. Informational [Page 43]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ [6] Wroclawski, J., "Specification of the Controlled Load Network
+ Element Service", RFC 2211, September 1997.
+
+ [7] Shenker, S., Partridge, C. and R. Guerin, "Specification of
+ Guaranteed Quality of Service", RFC 2212, September 1997.
+
+ [8] Braden, R., Clark, D. and S. Shenker, "Integrated Services in
+ the Internet Architecture: An Overview", RFC 1633, June 1994.
+
+ [9] Wroclawski, J., "The Use of RSVP with IETF Integrated Services",
+ RFC 2210, September 1997.
+
+ [10] Shenker, S. and J. Wroclawski, "Network Element Service
+ Specification Template", RFC 2216, September 1997.
+
+ [11] Shenker, S. and J. Wroclawski, "General Characterization
+ Parameters for Integrated Service Network Elements", RFC 2215,
+ September 1997.
+
+ [12] Delgrossi, L. and L. Berger (Editors), "Internet Stream Protocol
+ Version 2 (ST2) Protocol Specification - Version ST2+", RFC
+ 1819, August 1995.
+
+ [13] Seaman, M., Smith, A. and E. Crawley, "Integrated Service
+ Mappings on IEEE 802 Networks", RFC 2815, May 2000.
+
+ [14] Yavatkar, R., Hoffman, D., Bernet, Y. and F. Baker, "SBM Subnet
+ Bandwidth Manager): Protocol for RSVP-based Admission Control
+ Over IEEE 802-style Networks", RFC 2814, May 2000.
+
+ [15] ISO/IEC 8802-3 Information technology - Telecommunications and
+ information exchange between systems - Local and metropolitan
+ area networks - Common specifications - Part 3: Carrier Sense
+ Multiple Access with Collision Detection (CSMA/CD) Access Method
+ and Physical Layer Specifications, (also ANSI/IEEE Std 802.3-
+ 1996), 1996.
+
+ [15] ISO/IEC 8802-5 Information technology - Telecommunications and
+ information exchange between systems - Local and metropolitan
+ area networks - Common specifications - Part 5: Token Ring
+ Access Method and Physical Layer Specifications, (also ANSI/IEEE
+ Std 802.5-1995), 1995.
+
+ [17] Postel, J. and J. Reynolds, "A Standard for the Transmission of
+ IP Datagrams over IEEE 802 Networks", STD 43, RFC 1042, February
+ 1988.
+
+
+
+
+
+Ghanwani, et al. Informational [Page 44]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+ [18] C. Bisdikian, B. V. Patel, F. Schaffa, and M Willebeek-LeMair,
+ The Use of Priorities on Token Ring Networks for Multimedia
+ Traffic, IEEE Network, Nov/Dec 1995.
+
+ [19] IEEE Standards for Local and Metropolitan Area Networks: Demand
+ Priority Access Method, Physical Layer and Repeater
+ Specification for 100 Mb/s Operation, IEEE Std 802.12-1995.
+
+ [20] Fiber Distributed Data Interface MAC, ANSI Std. X3.139-1987.
+
+ [21] ISO/IEC 15802-3 Information technology - Telecommunications and
+ information exchange between systems - Local and metropolitan
+ area networks - Specific requirements - Supplement to Carrier
+ Sense Multiple Access with Collision Detection (CSMA/CD) Access
+ Method and Physical Layer Specifications - Frame Extensions for
+ Virtual Bridged Local Area Network (VLAN) Tagging on 802.3
+ Networks, IEEE Std 802.3ac-1998 (Supplement to IEEE 802.3 1998
+ Edition), 1998.
+
+Security Considerations
+
+ Implementation of the model described in this memo creates no known
+ new avenues for malicious attack on the network infrastructure.
+ However, readers are referred to Section 2.8 of the RSVP
+ specification [5] for a discussion of the impact of the use of
+ admission control signaling protocols on network security.
+
+Acknowledgements
+
+ Much of the work presented in this document has benefited greatly
+ from discussion held at the meetings of the Integrated Services over
+ Specific Link Layers (ISSLL) working group. We would like to
+ acknowledge contributions from the many participants via discussion
+ at these meetings and on the mailing list. We would especially like
+ to thank Eric Crawley, Don Hoffman and Raj Yavatkar for contributions
+ via previous Internet drafts, and Peter Kim for contributing the text
+ about Demand Priority networks.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 45]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+Authors' Addresses
+
+ Anoop Ghanwani
+ Nortel Networks
+ 600 Technology Park Dr
+ Billerica, MA 01821, USA
+
+ Phone: +1-978-288-4514
+ EMail: aghanwan@nortelnetworks.com
+
+
+ Wayne Pace
+ IBM Corporation
+ P. O. Box 12195
+ Research Triangle Park, NC 27709, USA
+
+ Phone: +1-919-254-4930
+ EMail: pacew@us.ibm.com
+
+
+ Vijay Srinivasan
+ CoSine Communications
+ 1200 Bridge Parkway
+ Redwood City, CA 94065, USA
+
+ Phone: +1-650-628-4892
+ EMail: vijay@cosinecom.com
+
+
+ Andrew Smith
+ Extreme Networks
+ 3585 Monroe St
+ Santa Clara, CA 95051, USA
+
+ Phone: +1-408-579-2821
+ EMail: andrew@extremenetworks.com
+
+
+ Mick Seaman
+ Telseon
+ 480 S. California Ave
+ Palo Alto, CA 94306
+ USA
+
+ Email: mick@telseon.com
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 46]
+
+RFC 2816 Framework for Int-Serv Over IEEE 802 LAN May 2000
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ghanwani, et al. Informational [Page 47]
+