diff options
Diffstat (limited to 'doc/rfc/rfc3246.txt')
-rw-r--r-- | doc/rfc/rfc3246.txt | 899 |
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc3246.txt b/doc/rfc/rfc3246.txt new file mode 100644 index 0000000..f837f03 --- /dev/null +++ b/doc/rfc/rfc3246.txt @@ -0,0 +1,899 @@ + + + + + + +Network Working Group B. Davie +Request for Comments: 3246 A. Charny +Obsoletes: 2598 Cisco Systems, Inc. +Category: Standards Track J.C.R. Bennett + Motorola + K. Benson + Tellabs + J.Y. Le Boudec + EPFL + W. Courtney + TRW + S. Davari + PMC-Sierra + V. Firoiu + Nortel Networks + D. Stiliadis + Lucent Technologies + March 2002 + + + An Expedited Forwarding PHB (Per-Hop Behavior) + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2001). All Rights Reserved. + +Abstract + + This document defines a PHB (per-hop behavior) called Expedited + Forwarding (EF). The PHB is a basic building block in the + Differentiated Services architecture. EF is intended to provide a + building block for low delay, low jitter and low loss services by + ensuring that the EF aggregate is served at a certain configured + rate. This document obsoletes RFC 2598. + + + + + + + + + +Davie, et. al. Standards Track [Page 1] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +Table of Contents + + 1 Introduction ........................................... 2 + 1.1 Relationship to RFC 2598 ............................... 3 + 2 Definition of EF PHB ................................... 3 + 2.1 Intuitive Description of EF ............................ 3 + 2.2 Formal Definition of the EF PHB ........................ 5 + 2.3 Figures of merit ....................................... 8 + 2.4 Delay and jitter ....................................... 8 + 2.5 Loss ................................................... 9 + 2.6 Microflow misordering .................................. 9 + 2.7 Recommended codepoint for this PHB ..................... 9 + 2.8 Mutability ............................................. 10 + 2.9 Tunneling .............................................. 10 + 2.10 Interaction with other PHBs ............................ 10 + 3 Security Considerations ................................ 10 + 4 IANA Considerations .................................... 11 + 5 Acknowledgments ........................................ 11 + 6 References ............................................. 11 + Appendix: Implementation Examples .............................. 12 + Authors' Addresses ............................................. 14 + Full Copyright Statement ....................................... 16 + +1. Introduction + + Network nodes that implement the differentiated services enhancements + to IP use a codepoint in the IP header to select a per-hop behavior + (PHB) as the specific forwarding treatment for that packet [3, 4]. + This memo describes a particular PHB called expedited forwarding + (EF). + + The intent of the EF PHB is to provide a building block for low loss, + low delay, and low jitter services. The details of exactly how to + build such services are outside the scope of this specification. + + The dominant causes of delay in packet networks are fixed propagation + delays (e.g. those arising from speed-of-light delays) on wide area + links and queuing delays in switches and routers. Since propagation + delays are a fixed property of the topology, delay and jitter are + minimized when queuing delays are minimized. In this context, jitter + is defined as the variation between maximum and minimum delay. The + intent of the EF PHB is to provide a PHB in which suitably marked + packets usually encounter short or empty queues. Furthermore, if + queues remain short relative to the buffer space available, packet + loss is also kept to a minimum. + + + + + + +Davie, et. al. Standards Track [Page 2] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + To ensure that queues encountered by EF packets are usually short, it + is necessary to ensure that the service rate of EF packets on a given + output interface exceeds their arrival rate at that interface over + long and short time intervals, independent of the load of other + (non-EF) traffic. This specification defines a PHB in which EF + packets are guaranteed to receive service at or above a configured + rate and provides a means to quantify the accuracy with which this + service rate is delivered over any time interval. It also provides a + means to quantify the maximum delay and jitter that a packet may + experience under bounded operating conditions. + + Note that the EF PHB only defines the behavior of a single node. The + specification of behavior of a collection of nodes is outside the + scope of this document. A Per-Domain Behavior (PDB) specification + [7] may provide such information. + + When a DS-compliant node claims to implement the EF PHB, the + implementation MUST conform to the specification given in this + document. However, the EF PHB is not a mandatory part of the + Differentiated Services architecture - a node is NOT REQUIRED to + implement the EF PHB in order to be considered DS-compliant. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [2]. + +1.1. Relationship to RFC 2598 + + This document replaces RFC 2598 [1]. The main difference is that it + adds mathematical formalism to give a more rigorous definition of the + behavior described. The full rationale for this is given in [6]. + +2. Definition of EF PHB + +2.1. Intuitive Description of EF + + Intuitively, the definition of EF is simple: the rate at which EF + traffic is served at a given output interface should be at least the + configured rate R, over a suitably defined interval, independent of + the offered load of non-EF traffic to that interface. Two + difficulties arise when we try to formalize this intuition: + + - it is difficult to define the appropriate timescale at which to + measure R. By measuring it at short timescales we may introduce + sampling errors; at long timescales we may allow excessive + jitter. + + + + + +Davie, et. al. Standards Track [Page 3] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + - EF traffic clearly cannot be served at rate R if there are no + EF packets waiting to be served, but it may be impossible to + determine externally whether EF packets are actually waiting to + be served by the output scheduler. For example, if an EF + packet has entered the router and not exited, it may be + awaiting service, or it may simply have encountered some + processing or transmission delay within the router. + + The formal definition below takes account of these issues. It + assumes that EF packets should ideally be served at rate R or faster, + and bounds the deviation of the actual departure time of each packet + from the "ideal" departure time of that packet. We define the + departure time of a packet as the time when the last bit of that + packet leaves the node. The "ideal" departure time of each EF packet + is computed iteratively. + + In the case when an EF packet arrives at a device when all the + previous EF packets have already departed, the computation of the + ideal departure time is simple. Service of the packet should + (ideally) start as soon as it arrives, so the ideal departure time is + simply the arrival time plus the ideal time to transmit the packet at + rate R. For a packet of length L_j, that transmission time at the + configured rate R is L_j/R. (Of course, a real packet will typically + get transmitted at line rate once its transmission actually starts, + but we are calculating the ideal target behavior here; the ideal + service takes place at rate R.) + + In the case when an EF packet arrives at a device that still contains + EF packets awaiting service, the computation of the ideal departure + time is more complicated. There are two cases to be considered. If + the previous (j-1-th) departure occurred after its own ideal + departure time, then the scheduler is running "late". In this case, + the ideal time to start service of the new packet is the ideal + departure time of the previous (j-1-th) packet, or the arrival time + of the new packet, whichever is later, because we cannot expect a + packet to begin service before it arrives. If the previous (j-1-th) + departure occurred before its own ideal departure time, then the + scheduler is running "early". In this case, service of the new + packet should begin at the actual departure time of the previous + packet. + + Once we know the time at which service of the j-th packet should + (ideally) begin, then the ideal departure time of the j-th packet is + L_j/R seconds later. Thus we are able to express the ideal departure + time of the j-th packet in terms of the arrival time of the j-th + packet, the actual departure time of the j-1-th packet, and the ideal + departure time of the j-1-th packet. Equations eq_1 and eq_2 in + Section 2.2 capture this relationship. + + + +Davie, et. al. Standards Track [Page 4] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + Whereas the original EF definition did not provide any means to + guarantee the delay of an individual EF packet, this property may be + desired. For this reason, the equations in Section 2.2 consist of + two parts: an "aggregate behavior" set and a "packet-identity-aware" + set of equations. The aggregate behavior equations (eq_1 and eq_2) + simply describe the properties of the service delivered to the EF + aggregate by the device. The "packet-identity-aware" equations (eq_3 + and eq_4) enable the bound on delay of an individual packet to be + calculated given a knowledge of the operating conditions of the + device. The significance of these two sets of equations is discussed + further in Section 2.2. Note that these two sets of equations provide + two ways of characterizing the behavior of a single device, not two + different modes of behavior. + +2.2. Formal Definition of the EF PHB + + A node that supports EF on an interface I at some configured rate R + MUST satisfy the following equations: + + d_j <= f_j + E_a for all j > 0 (eq_1) + + where f_j is defined iteratively by + + f_0 = 0, d_0 = 0 + + f_j = max(a_j, min(d_j-1, f_j-1)) + l_j/R, for all j > 0 (eq_2) + + In this definition: + + - d_j is the time that the last bit of the j-th EF packet to + depart actually leaves the node from the interface I. + + - f_j is the target departure time for the j-th EF packet to + depart from I, the "ideal" time at or before which the last bit + of that packet should leave the node. + + - a_j is the time that the last bit of the j-th EF packet + destined to the output I actually arrives at the node. + + - l_j is the size (bits) of the j-th EF packet to depart from I. + l_j is measured on the IP datagram (IP header plus payload) and + does not include any lower layer (e.g. MAC layer) overhead. + + - R is the EF configured rate at output I (in bits/second). + + + + + + + +Davie, et. al. Standards Track [Page 5] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + - E_a is the error term for the treatment of the EF aggregate. + Note that E_a represents the worst case deviation between the + actual departure time of an EF packet and the ideal departure + time of the same packet, i.e. E_a provides an upper bound on + (d_j - f_j) for all j. + + - d_0 and f_0 do not refer to a real packet departure but are + used purely for the purposes of the recursion. The time origin + should be chosen such that no EF packets are in the system at + time 0. + + - for the definitions of a_j and d_j, the "last bit" of the + packet includes the layer 2 trailer if present, because a + packet cannot generally be considered available for forwarding + until such a trailer has been received. + + An EF-compliant node MUST be able to be characterized by the range of + possible R values that it can support on each of its interfaces while + conforming to these equations, and the value of E_a that can be met + on each interface. R may be line rate or less. E_a MAY be specified + as a worst-case value for all possible R values or MAY be expressed + as a function of R. + + Note also that, since a node may have multiple inputs and complex + internal scheduling, the j-th EF packet to arrive at the node + destined for a certain interface may not be the j-th EF packet to + depart from that interface. It is in this sense that eq_1 and eq_2 + are unaware of packet identity. + + In addition, a node that supports EF on an interface I at some + configured rate R MUST satisfy the following equations: + + D_j <= F_j + E_p for all j > 0 (eq_3) + + where F_j is defined iteratively by + + F_0 = 0, D_0 = 0 + + F_j = max(A_j, min(D_j-1, F_j-1)) + L_j/R, for all j > 0 (eq_4) + + In this definition: + + - D_j is the actual departure time of the individual EF packet + that arrived at the node destined for interface I at time A_j, + i.e., given a packet which was the j-th EF packet destined for + I to arrive at the node via any input, D_j is the time at which + the last bit of that individual packet actually leaves the node + from the interface I. + + + +Davie, et. al. Standards Track [Page 6] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + - F_j is the target departure time for the individual EF packet + that arrived at the node destined for interface I at time A_j. + + - A_j is the time that the last bit of the j-th EF packet + destined to the output I to arrive actually arrives at the + node. + + - L_j is the size (bits) of the j-th EF packet to arrive at the + node that is destined to output I. L_j is measured on the IP + datagram (IP header plus payload) and does not include any + lower layer (e.g. MAC layer) overhead. + + - R is the EF configured rate at output I (in bits/second). + + - E_p is the error term for the treatment of individual EF + packets. Note that E_p represents the worst case deviation + between the actual departure time of an EF packet and the ideal + departure time of the same packet, i.e. E_p provides an upper + bound on (D_j - F_j) for all j. + + - D_0 and F_0 do not refer to a real packet departure but are + used purely for the purposes of the recursion. The time origin + should be chosen such that no EF packets are in the system at + time 0. + + - for the definitions of A_j and D_j, the "last bit" of the + packet includes the layer 2 trailer if present, because a + packet cannot generally be considered available for forwarding + until such a trailer has been received. + + It is the fact that D_j and F_j refer to departure times for the j-th + packet to arrive that makes eq_3 and eq_4 aware of packet identity. + This is the critical distinction between the last two equations and + the first two. + + An EF-compliant node SHOULD be able to be characterized by the range + of possible R values that it can support on each of its interfaces + while conforming to these equations, and the value of E_p that can be + met on each interface. E_p MAY be specified as a worst-case value + for all possible R values or MAY be expressed as a function of R. An + E_p value of "undefined" MAY be specified. For discussion of + situations in which E_p may be undefined see the Appendix and [6]. + + For the purposes of testing conformance to these equations, it may be + necessary to deal with packet arrivals on different interfaces that + are closely spaced in time. If two or more EF packets destined for + the same output interface arrive (on different inputs) at almost the + + + + +Davie, et. al. Standards Track [Page 7] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + same time and the difference between their arrival times cannot be + measured, then it is acceptable to use a random tie-breaking method + to decide which packet arrived "first". + +2.3. Figures of merit + + E_a and E_p may be thought of as "figures of merit" for a device. A + smaller value of E_a means that the device serves the EF aggregate + more smoothly at rate R over relatively short timescales, whereas a + larger value of E_a implies a more bursty scheduler which serves the + EF aggregate at rate R only when measured over longer intervals. A + device with a larger E_a can "fall behind" the ideal service rate R + by a greater amount than a device with a smaller E_a. + + A lower value of E_p implies a tighter bound on the delay experienced + by an individual packet. Factors that might lead to a higher E_p + might include a large number of input interfaces (since an EF packet + might arrive just behind a large number of EF packets that arrived on + other interfaces), or might be due to internal scheduler details + (e.g. per-flow scheduling within the EF aggregate). + + We observe that factors that increase E_a such as those noted above + will also increase E_p, and that E_p is thus typically greater than + or equal to E_a. In summary, E_a is a measure of deviation from + ideal service of the EF aggregate at rate R, while E_p measures both + non-ideal service and non-FIFO treatment of packets within the + aggregate. + + For more discussion of these issues see the Appendix and [6]. + +2.4. Delay and jitter + + Given a known value of E_p and a knowledge of the bounds on the EF + traffic offered to a given output interface, summed over all input + interfaces, it is possible to bound the delay and jitter that will be + experienced by EF traffic leaving the node via that interface. The + delay bound is + + D = B/R + E_p (eq_5) + + where + + - R is the configured EF service rate on the output interface + + - the total offered load of EF traffic destined to the output + interface, summed over all input interfaces, is bounded by a + token bucket of rate r <= R and depth B + + + + +Davie, et. al. Standards Track [Page 8] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + Since the minimum delay through the device is clearly at least zero, + D also provides a bound on jitter. To provide a tighter bound on + jitter, the value of E_p for a device MAY be specified as two + separate components such that + + E_p = E_fixed + E_variable + + where E_fixed represents the minimum delay that can be experienced by + an EF packet through the node. + +2.5. Loss + + The EF PHB is intended to be a building block for low loss services. + However, under sufficiently high load of EF traffic (including + unexpectedly large bursts from many inputs at once), any device with + finite buffers may need to discard packets. Thus, it must be + possible to establish whether a device conforms to the EF definition + even when some packets are lost. This is done by performing an + "off-line" test of conformance to equations 1 through 4. After + observing a sequence of packets entering and leaving the node, the + packets which did not leave are assumed lost and are notionally + removed from the input stream. The remaining packets now constitute + the arrival stream (the a_j's) and the packets which left the node + constitute the departure stream (the d_j's). Conformance to the + equations can thus be verified by considering only those packets that + successfully passed through the node. + + In addition, to assist in meeting the low loss objective of EF, a + node MAY be characterized by the operating region in which loss of EF + due to congestion will not occur. This MAY be specified, using a + token bucket of rate r <= R and burstsize B, as the sum of traffic + across all inputs to a given output interface that can be tolerated + without loss. + + In the event that loss does occur, the specification of which packets + are lost is beyond the scope of this document. However it is a + requirement that those packets not lost MUST conform to the equations + of Section 2.2. + +2.6. Microflow misordering + + Packets belonging to a single microflow within the EF aggregate + passing through a device SHOULD NOT experience re-ordering in normal + operation of the device. + +2.7. Recommended codepoint for this PHB + + Codepoint 101110 is RECOMMENDED for the EF PHB. + + + +Davie, et. al. Standards Track [Page 9] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +2.8. Mutability + + Packets marked for EF PHB MAY be remarked at a DS domain boundary + only to other codepoints that satisfy the EF PHB. Packets marked for + EF PHBs SHOULD NOT be demoted or promoted to another PHB by a DS + domain. + +2.9. Tunneling + + When EF packets are tunneled, the tunneling packets SHOULD be marked + as EF. A full discussion of tunneling issues is presented in [5]. + +2.10. Interaction with other PHBs + + Other PHBs and PHB groups may be deployed in the same DS node or + domain with the EF PHB. The equations of Section 2.2 MUST hold for a + node independent of the amount of non-EF traffic offered to it. + + If the EF PHB is implemented by a mechanism that allows unlimited + preemption of other traffic (e.g., a priority queue), the + implementation MUST include some means to limit the damage EF traffic + could inflict on other traffic (e.g., a token bucket rate limiter). + Traffic that exceeds this limit MUST be discarded. This maximum EF + rate, and burst size if appropriate, MUST be settable by a network + administrator (using whatever mechanism the node supports for non- + volatile configuration). + +3. Security Considerations + + To protect itself against denial of service attacks, the edge of a DS + domain SHOULD strictly police all EF marked packets to a rate + negotiated with the adjacent upstream domain. Packets in excess of + the negotiated rate SHOULD be dropped. If two adjacent domains have + not negotiated an EF rate, the downstream domain SHOULD use 0 as the + rate (i.e., drop all EF marked packets). + + In addition, traffic conditioning at the ingress to a DS-domain MUST + ensure that only packets having DSCPs that correspond to an EF PHB + when they enter the DS-domain are marked with a DSCP that corresponds + to EF inside the DS-domain. Such behavior is as required by the + Differentiated Services architecture [4]. It protects against + denial-of-service and theft-of-service attacks which exploit DSCPs + that are not identified in any Traffic Conditioning Specification + provisioned at an ingress interface, but which map to EF inside the + DS-domain. + + + + + + +Davie, et. al. Standards Track [Page 10] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +4. IANA Considerations + + This document allocates one codepoint, 101110, in Pool 1 of the code + space defined by [3]. + +5. Acknowledgments + + This document was the result of collaboration and discussion among a + large number of people. In particular, Fred Baker, Angela Chiu, + Chuck Kalmanek, and K. K. Ramakrishnan made significant contributions + to the new EF definition. John Wroclawski provided many helpful + comments to the authors. This document draws heavily on the original + EF PHB definition of Jacobson, Nichols, and Poduri. It was also + greatly influenced by the work of the EFRESOLVE team of Armitage, + Casati, Crowcroft, Halpern, Kumar, and Schnizlein. + +6. References + + [1] Jacobson, V., Nichols, K. and K. Poduri, "An Expedited + Forwarding PHB", RFC 2598, June 1999. + + [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + [3] Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of + the Differentiated Services Field (DS Field) in the IPv4 and + IPv6 Headers", RFC 2474, December 1998. + + [4] Black, D., Blake, S., Carlson, M., Davies, E., Wang, Z. and W. + Weiss, "An Architecture for Differentiated Services", RFC 2475, + December 1998. + + [5] Black, D., "Differentiated Services and Tunnels", RFC 2983, + October 2000. + + [6] Charny, A., Baker, F., Davie, B., Bennett, J.C.R., Benson, K., + Le Boudec, J.Y., Chiu, A., Courtney, W., Davari, S., Firoiu, + V., Kalmanek, C., Ramakrishnan, K.K. and D. Stiliadis, + "Supplemental Information for the New Definition of the EF PHB + (Expedited Forwarding Per-Hop Behavior)", RFC 3247, March 2002. + + [7] Nichols K. and B. Carpenter, "Definition of Differentiated + Services Per Domain Behaviors and Rules for their + Specification", RFC 3086, April 2001. + + + + + + + +Davie, et. al. Standards Track [Page 11] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +Appendix: Implementation Examples + + This appendix is not part of the normative specification of EF. + However, it is included here as a possible source of useful + information for implementors. + + A variety of factors in the implementation of a node supporting EF + will influence the values of E_a and E_p. These factors are + discussed in more detail in [6], and include both output schedulers + and the internal design of a device. + + A priority queue is widely considered as the canonical example of an + implementation of EF. A "perfect" output buffered device (i.e. one + which delivers packets immediately to the appropriate output queue) + with a priority queue for EF traffic will provide both a low E_a and + a low E_p. We note that the main factor influencing E_a will be the + inability to pre-empt an MTU-sized non-EF packet that has just begun + transmission at the time when an EF packet arrives at the output + interface, plus any additional delay that might be caused by non- + pre-emptable queues between the priority queue and the physical + interface. E_p will be influenced primarily by the number of + interfaces. + + Another example of an implementation of EF is a weighted round robin + scheduler. Such an implementation will typically not be able to + support values of R as high as the link speeds, because the maximum + rate at which EF traffic can be served in the presence of competing + traffic will be affected by the number of other queues and the + weights given to them. Furthermore, such an implementation is likely + to have a value of E_a that is higher than a priority queue + implementation, all else being equal, as a result of the time spent + serving non-EF queues by the round robin scheduler. + + Finally, it is possible to implement hierarchical scheduling + algorithms, such that some non-FIFO scheduling algorithm is run on + sub-flows within the EF aggregate, while the EF aggregate as a whole + could be served at high priority or with a large weight by the top- + level scheduler. Such an algorithm might perform per-input + scheduling or per-microflow scheduling within the EF aggregate, for + example. Because such algorithms lead to non-FIFO service within the + EF aggregate, the value of E_p for such algorithms may be higher than + for other implementations. For some schedulers of this type it may + be difficult to provide a meaningful bound on E_p that would hold for + any pattern of traffic arrival, and thus a value of "undefined" may + be most appropriate. + + + + + + +Davie, et. al. Standards Track [Page 12] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + It should be noted that it is quite acceptable for a Diffserv domain + to provide multiple instances of EF. Each instance should be + characterizable by the equations in Section 2.2 of this + specification. The effect of having multiple instances of EF on the + E_a and E_p values of each instance will depend considerably on how + the multiple instances are implemented. For example, in a multi- + level priority scheduler, an instance of EF that is not at the + highest priority may experience relatively long periods when it + receives no service while higher priority instances of EF are served. + This would result in relatively large values of E_a and E_p. By + contrast, in a WFQ-like scheduler, each instance of EF would be + represented by a queue served at some configured rate and the values + of E_a and E_p could be similar to those for a single EF instance. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Davie, et. al. Standards Track [Page 13] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +Authors' Addresses + + Bruce Davie + Cisco Systems, Inc. + 300 Apollo Drive + Chelmsford, MA, 01824 + + EMail: bsd@cisco.com + + Anna Charny + Cisco Systems + 300 Apollo Drive + Chelmsford, MA 01824 + + EMail: acharny@cisco.com + + Jon Bennett + Motorola + 3 Highwood Drive East + Tewksbury, MA 01876 + + EMail: jcrb@motorola.com + + Kent Benson + Tellabs Research Center + 3740 Edison Lake Parkway #101 + Mishawaka, IN 46545 + + EMail: Kent.Benson@tellabs.com + + Jean-Yves Le Boudec + ICA-EPFL, INN + Ecublens, CH-1015 + Lausanne-EPFL, Switzerland + + EMail: jean-yves.leboudec@epfl.ch + + Bill Courtney + TRW + Bldg. 201/3702 + One Space Park + Redondo Beach, CA 90278 + + EMail: bill.courtney@trw.com + + + + + + + +Davie, et. al. Standards Track [Page 14] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + + Shahram Davari + PMC-Sierra Inc + 411 Legget Drive + Ottawa, ON K2K 3C9, Canada + + EMail: shahram_davari@pmc-sierra.com + + Victor Firoiu + Nortel Networks + 600 Tech Park + Billerica, MA 01821 + + EMail: vfiroiu@nortelnetworks.com + + Dimitrios Stiliadis + Lucent Technologies + 101 Crawfords Corner Road + Holmdel, NJ 07733 + + EMail: stiliadi@bell-labs.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Davie, et. al. Standards Track [Page 15] + +RFC 3246 An Expedited Forwarding PHB March 2002 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2001). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Davie, et. al. Standards Track [Page 16] + |