diff options
Diffstat (limited to 'doc/rfc/rfc4126.txt')
-rw-r--r-- | doc/rfc/rfc4126.txt | 1235 |
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc4126.txt b/doc/rfc/rfc4126.txt new file mode 100644 index 0000000..4f3d890 --- /dev/null +++ b/doc/rfc/rfc4126.txt @@ -0,0 +1,1235 @@ + + + + + + +Network Working Group J. Ash +Request for Comments: 4126 AT&T +Category: Experimental June 2005 + + + Max Allocation with Reservation Bandwidth Constraints Model for + Diffserv-aware MPLS Traffic Engineering & Performance Comparisons + +Status of This Memo + + This memo defines an Experimental Protocol for the Internet + community. It does not specify an Internet standard of any kind. + Discussion and suggestions for improvement are requested. + Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2005). + +Abstract + + This document complements the Diffserv-aware MPLS Traffic Engineering + (DS-TE) requirements document by giving a functional specification + for the Maximum Allocation with Reservation (MAR) Bandwidth + Constraints Model. Assumptions, applicability, and examples of the + operation of the MAR Bandwidth Constraints Model are presented. MAR + performance is analyzed relative to the criteria for selecting a + Bandwidth Constraints Model, in order to provide guidance to user + implementation of the model in their networks. + +Table of Contents + + 1. Introduction ....................................................2 + 1.1. Specification of Requirements ..............................3 + 2. Definitions .....................................................3 + 3. Assumptions & Applicability .....................................5 + 4. Functional Specification of the MAR Bandwidth + Constraints Model ...............................................6 + 5. Setting Bandwidth Constraints ...................................7 + 6. Example of MAR Operation ........................................8 + 7. Summary .........................................................9 + 8. Security Considerations ........................................10 + 9. IANA Considerations ............................................10 + 10. Acknowledgements ..............................................10 + A. MAR Operation & Performance Analysis ..........................11 + B. Bandwidth Prediction for Path Computation ......................19 + Normative References ..............................................20 + Informative References ............................................20 + + + +Ash Experimental [Page 1] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + +1. Introduction + + Diffserv-aware MPLS traffic engineering (DS-TE) requirements and + protocol extensions are specified in [DSTE-REQ, DSTE-PROTO]. A + requirement for DS-TE implementation is the specification of + Bandwidth Constraints Models for use with DS-TE. The Bandwidth + Constraints Model provides the 'rules' to support the allocation of + bandwidth to individual class types (CTs). CTs are groupings of + service classes in the DS-TE model, which are provided separate + bandwidth allocations, priorities, and QoS objectives. Several CTs + can share a common bandwidth pool on an integrated, multiservice + MPLS/Diffserv network. + + This document is intended to complement the DS-TE requirements + document [DSTE-REQ] by giving a functional specification for the + Maximum Allocation with Reservation (MAR) Bandwidth Constraints + Model. Examples of the operation of the MAR Bandwidth Constraints + Model are presented. MAR performance is analyzed relative to the + criteria for selecting a Bandwidth Constraints Model, in order to + provide guidance to user implementation of the model in their + networks. + + Two other Bandwidth Constraints Models are being specified for use in + DS-TE: + + 1. Maximum Allocation Model (MAM) [MAM] - the maximum allowable + bandwidth usage of each CT is explicitly specified. + + 2. Russian Doll Model (RDM) [RDM] - the maximum allowable bandwidth + usage is done cumulatively by grouping successive CTs according to + priority classes. + + MAR is similar to MAM in that a maximum bandwidth allocation is given + to each CT. However, through the use of bandwidth reservation and + protection mechanisms, CTs are allowed to exceed their bandwidth + allocations under conditions of no congestion but revert to their + allocated bandwidths when overload and congestion occurs. + + All Bandwidth Constraints Models should meet these objectives: + + 1. applies equally when preemption is either enabled or disabled + (when preemption is disabled, the model still works 'reasonably' + well), + + 2. bandwidth efficiency, i.e., good bandwidth sharing among CTs under + both normal and overload conditions, + + + + + +Ash Experimental [Page 2] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + 3. bandwidth isolation, i.e., a CT cannot hog the bandwidth of + another CT under overload conditions, + + 4. protection against QoS degradation, at least of the high-priority + CTs (e.g., high-priority voice, high-priority data, etc.), and + + 5. reasonably simple, i.e., does not require additional IGP + extensions and minimizes signaling load processing requirements. + + In Appendix A, modeling analysis is presented that shows the MAR + Model meets all of these objectives and provides good network + performance, relative to MAM and full-sharing models, under normal + and abnormal operating conditions. It is demonstrated that MAR + simultaneously achieves bandwidth efficiency, bandwidth isolation, + and protection against QoS degradation without preemption. + + In Section 3 we give the assumptions and applicability; in Section 4 + a functional specification of the MAR Bandwidth Constraints Model; + and in Section 5 we give examples of its operation. In Appendix A, + MAR performance is analyzed relative to the criteria for selecting a + Bandwidth Constraints Model, in order to provide guidance to user + implementation of the model in their networks. In Appendix B, + bandwidth prediction for path computation is discussed. + +1.1. Specification of Requirements + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +2. Definitions + + For readability a number of definitions from [DSTE-REQ, DSTE-PROTO] + are repeated here: + + Traffic Trunk: an aggregation of traffic flows of the same class + (i.e., treated equivalently from the DS-TE + perspective), which is placed inside a Label + Switched Path (LSP). + + Class-Type (CT): the set of Traffic Trunks crossing a link that is + governed by a specific set of bandwidth + constraints. CT is used for the purposes of link + bandwidth allocation, constraint-based routing, + and admission control. A given Traffic Trunk + belongs to the same CT on all links. + + + + + +Ash Experimental [Page 3] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + Up to 8 CTs (MaxCT = 8) are supported. They are + referred to as CTc, 0 <= c <= MaxCT-1 = 7. Each + CT is assigned either a Bandwidth Constraint, or + a set of Bandwidth Constraints. Up to 8 + Bandwidth Constraints (MaxBC = 8) are supported + and they are referred to as BCc, 0 <= c <= + MaxBC-1 = 7. + + TE-Class: A pair of: a) a CT, and b) a preemption priority + allowed for that CT. This means that an LSP, + transporting a Traffic Trunk from that CT, can + use that preemption priority as the set-up + priority, the holding priority, or both. + + MAX_RESERVABLE_BWk: maximum reservable bandwidth on link k specifies + the maximum bandwidth that may be reserved; this + may be greater than the maximum link bandwidth, + in which case the link may be oversubscribed + [OSPF-TE]. + + BCck: bandwidth constraint for CTc on link k = + allocated (minimum guaranteed) bandwidth for CTc + on link k (see Section 4). + + RBW_THRESk: reservation bandwidth threshold for link k (see + Section 4). + + RESERVED_BWck: reserved bandwidth-in-progress on CTc on link k + (0 <= c <= MaxCT-1), RESERVED_BWck = total amount + of the bandwidth reserved by all the established + LSPs that belong to CTc. + + UNRESERVED_BWk: unreserved link bandwidth on link k specifies the + amount of bandwidth not yet reserved for any CT, + UNRESERVED_BWk = MAX_RESERVABLE_BWk - sum + [RESERVED_BWck (0 <= c <= MaxCT-1)]. + + UNRESERVED_BWck: unreserved link bandwidth on CTc on link k + specifies the amount of bandwidth not yet + reserved for CTc, UNRESERVED_BWck = + UNRESERVED_BWk - delta0/1(CTck) * RBW-THRESk + where + + delta0/1(CTck) = 0 if RESERVED_BWck < BCck + delta0/1(CTck) = 1 if RESERVED_BWck >= BCck + + + + + + +Ash Experimental [Page 4] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + A number of recovery mechanisms under investigation in the IETF take + advantage of the concept of bandwidth sharing across particular sets + of LSPs. "Shared Mesh Restoration" in [GMPLS-RECOV] and "Facility- + based Computation Model" in [MPLS-BACKUP] are example mechanisms that + increase bandwidth efficiency by sharing bandwidth across backup LSPs + protecting against independent failures. To ensure that the notion + of RESERVED_BWck introduced in [DSTE-REQ] is compatible with such a + concept of bandwidth sharing across multiple LSPs, the wording of the + definition provided in [DSTE-REQ] is generalized. With this + generalization, the definition is compatible with Shared Mesh + Restoration defined in [GMPLS-RECOV], so that DS-TE and Shared Mesh + Protection can operate simultaneously, under the assumption that + Shared Mesh Restoration operates independently within each DS-TE + Class-Type and does not operate across Class-Types. For example, + backup LSPs protecting primary LSPs of CTc also need to belong to + CTc; excess traffic LSPs that share bandwidth with backup LSPs of CTc + also need to belong to CTc. + +3. Assumptions & Applicability + + In general, DS-TE is a bandwidth allocation mechanism for different + classes of traffic allocated to various CTs (e.g., voice, normal + data, best-effort data). Network operation functions such as + capacity design, bandwidth allocation, routing design, and network + planning are normally based on traffic-measured load and forecast + [ASH1]. + + As such, the following assumptions are made according to the + operation of MAR: + + 1. Connection admission control (CAC) allocates bandwidth for network + flows/LSPs according to the traffic load assigned to each CT, + based on traffic measurement and forecast. + + 2. CAC could allocate bandwidth per flow, per LSP, per traffic trunk, + or otherwise. That is, no specific assumption is made about a + specific CAC method, except that CT bandwidth allocation is + related to the measured/forecasted traffic load, as per assumption + #1. + + 3. CT bandwidth allocation is adjusted up or down according to + measured/forecast traffic load. No specific time period is + assumed for this adjustment, it could be short term (seconds, + minutes, hours), daily, weekly, monthly, or otherwise. + + + + + + + +Ash Experimental [Page 5] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + 4. Capacity management and CT bandwidth allocation thresholds (e.g., + BCc) are designed according to traffic load, and are based on + traffic measurement and forecast. Again, no specific time period + is assumed for this adjustment, it could be short term (hours), + daily, weekly, monthly, or otherwise. + + 5. No assumption is made on the order in which traffic is allocated + to various CTs; again traffic allocation is assumed to be based + only on traffic load as it is measured and/or forecast. + + 6. If link bandwidth is exhausted on a given path for a + flow/LSP/traffic trunk, alternate paths may be attempted to + satisfy CT bandwidth allocation. + + Note that the above assumptions are not unique to MAR, but are + generic, common assumptions for all BC Models. + +4. Functional Specification of the MAR Bandwidth Constraints Model + + A DS-TE Label Switching Router (LSR) that implements MAR MUST support + enforcement of bandwidth constraints, in compliance with the + specifications in this section. + + In the MAR Bandwidth Constraints Model, the bandwidth allocation + control for each CT is based on estimated bandwidth needs, bandwidth + use, and status of links. The Label Edge Router (LER) makes needed + bandwidth allocation changes, and uses [RSVP-TE], for example, to + determine if link bandwidth can be allocated to a CT. Bandwidth + allocated to individual CTs is protected as needed, but otherwise it + is shared. Under normal, non-congested network conditions, all + CTs/services fully share all available bandwidth. When congestion + occurs for a particular CTc, bandwidth reservation prohibits traffic + from other CTs from seizing the allocated capacity for CTc. + + On a given link k, a small amount of bandwidth RBW_THRESk (the + reservation bandwidth threshold for link k) is reserved and governs + the admission control on link k. Also associated with each CTc on + link k are the allocated bandwidth constraints BCck to govern + bandwidth allocation and protection. The reservation bandwidth on a + link (RBW_THRESk) can be accessed when a given CTc has bandwidth-in- + use (RESERVED_BWck) below its allocated bandwidth constraint (BCck). + However, if RESERVED_BWck exceeds its allocated bandwidth constraint + (BCck), then the reservation bandwidth (RBW_THRESk) cannot be + accessed. In this way, bandwidth can be fully shared among CTs if + available, but is otherwise protected by bandwidth reservation + methods. + + + + + +Ash Experimental [Page 6] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + Bandwidth can be accessed for a bandwidth request = DBW for CTc on a + given link k based on the following rules: + + Table 1: Rules for Admitting LSP Bandwidth Request = DBW on Link k + + For LSP on a high priority or normal priority CTc: + + If RESERVED_BWck <= BCck: admit if DBW <= UNRESERVED_BWk + If RESERVED_BWck > BCck: admit if DBW <= UNRESERVED_BWk - RBW_THRESk; + + or, equivalently: + + If DBW <= UNRESERVED_BWck, admit the LSP. + + For LSP on a best-effort priority CTc: + allocated bandwidth BCck = 0; + Diffserv queuing admits BE packets only if there is available link + bandwidth. + + The normal semantics of setup and holding priority are applied in the + MAR Bandwidth Constraints Model, and cross-CT preemption is permitted + when preemption is enabled. + + The bandwidth allocation rules defined in Table 1 are illustrated + with an example in Section 6 and simulation analysis in Appendix A. + +5. Setting Bandwidth Constraints + + For a normal priority CTc, the bandwidth constraints BCck on link k + are set by allocating the maximum reservable bandwidth + (MAX_RESERVABLE_BWk) in proportion to the forecast or measured + traffic load bandwidth (TRAF_LOAD_BWck) for CTc on link k. That is: + +PROPORTIONAL_BWck = TRAF_LOAD_BWck/[sum {TRAF_LOAD_BWck, c=0, MaxCT-1}] + X MAX_RESERVABLE_BWk + +For normal priority CTc: +BCck = PROPORTIONAL_BWck + + For a high priority CT, the bandwidth constraint BCck is set to a + multiple of the proportional bandwidth. That is: + + For high priority CTc: + BCck = FACTOR X PROPORTIONAL_BWck + + where FACTOR is set to a multiple of the proportional bandwidth + (e.g., FACTOR = 2 or 3 is typical). This results in some 'over- + allocation' of the maximum reservable bandwidth, and gives priority + + + +Ash Experimental [Page 7] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + to the high priority CTs. Normally the bandwidth allocated to high + priority CTs should be a relatively small fraction of the total link + bandwidth, with a maximum of 10-15 percent being a reasonable + guideline. + + As stated in Section 4, the bandwidth allocated to a best-effort + priority CTc should be set to zero. That is: + + For best-effort priority CTc: + BCck = 0 + +6. Example of MAR Operation + + In the example, assume there are three class-types: CT0, CT1, CT2. + We consider a particular link with + + MAX-RESERVABLE_BW = 100 + + And with the allocated bandwidth constraints set as follows: + + BC0 = 30 + BC1 = 20 + BC2 = 20 + + These bandwidth constraints are based on the normal traffic loads, as + discussed in Section 5. With MAR, any of the CTs is allowed to + exceed its bandwidth constraint (BCc) as long a there are at least + RBW_THRES (reservation bandwidth threshold on the link) units of + spare bandwidth remaining. Let's assume + + RBW_THRES = 10 + + So under overload, if + + RESERVED_BW0 = 50 + RESERVED_BW1 = 30 + RESERVED_BW2 = 10 + + Therefore, for this loading + + UNRESERVED_BW = 100 - 50 - 30 - 10 = 10 + + CT0 and CT1 can no longer increase their bandwidth on the link, + because they are above their BC values and there is only RBW_THRES=10 + units of spare bandwidth left on the link. But CT2 can take the + additional bandwidth (up to 10 units) if the demand arrives, because + it is below its BC value. + + + + +Ash Experimental [Page 8] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + As also discussed in Section 4, if best effort traffic is present, it + can always seize whatever spare bandwidth is available on the link at + the moment, but is subject to being lost at the queues in favor of + the higher priority traffic. + + Let's say an LSP arrives for CT0 needing 5 units of bandwidth (i.e., + DBW = 5). We need to decide, based on Table 1, whether to admit this + LSP or not. Since for CT0 + + RESERVED_BW0 > BC0 (50 > 30), and + DBW > UNRESERVED_BW - RBW_THRES (i.e., 5 > 10 - 10) + + Table 1 says the LSP is rejected/blocked. + + Now let's say an LSP arrives for CT2 needing 5 units of bandwidth + (i.e., DBW = 5). We need to decide based on Table 1 whether to admit + this LSP or not. Since for CT2 + + RESERVED_BW2 < BC2 (10 < 20), and + DBW < UNRESERVED_BW (i.e., 5 < 10) + + Table 1 says to admit the LSP. + + Hence, in the above example, in the current state of the link and in + the current CT loading, CT0 and CT1 can no longer increase their + bandwidth on the link, because they are above their BCc values and + there is only RBW_THRES=10 units of spare bandwidth left on the link. + But CT2 can take the additional bandwidth (up to 10 units) if the + demand arrives, because it is below its BCc value. + +7. Summary + + The proposed MAR Bandwidth Constraints Model includes the following: + + 1. allocation of bandwidth to individual CTs, + + 2. protection of allocated bandwidth by bandwidth reservation + methods, as needed, but otherwise full sharing of bandwidth, + + 3. differentiation between high-priority, normal-priority, and best- + effort priority services, and + + 4. provision of admission control to reject connection requests, when + needed, in order to meet performance objectives. + + The modeling results presented in Appendix A show that MAR bandwidth + allocation achieves a) greater efficiency in bandwidth sharing while + still providing bandwidth isolation and protection against QoS + + + +Ash Experimental [Page 9] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + degradation, and b) service differentiation for high-priority, + normal-priority, and best-effort priority services. + +8. Security Considerations + + Security considerations related to the use of DS-TE are discussed in + [DSTE-PROTO]. They apply independently of the Bandwidth Constraints + Model, including the MAR specified in this document. + +9. IANA Considerations + + [DSTE-PROTO] defines a new name space for "Bandwidth Constraints + Model Id". The guidelines for allocation of values in that name + space are detailed in Section 13.1 of [DSTE-PROTO]. In accordance + with these guidelines, the IANA has assigned a Bandwidth Constraints + Model Id for MAR from the range 0-239 (which is to be managed as per + the "Specification Required" policy defined in [IANA-CONS]). + + Bandwidth Constraints Model Id 2 was allocated by IANA to MAR. + +10. Acknowledgements + + DS-TE and Bandwidth Constraints Models have been an active area of + discussion in the TEWG. I would like to thank Wai Sum Lai for his + support and review of this document. I also appreciate helpful + discussions with Francois Le Faucheur. + + + + + + + + + + + + + + + + + + + + + + + + + +Ash Experimental [Page 10] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + +Appendix A. MAR Operation & Performance Analysis + +A.1. MAR Operation + + In the MAR Bandwidth Constraints Model, the bandwidth allocation + control for each CT is based on estimated bandwidth needs, bandwidth + use, and status of links. The LER makes needed bandwidth allocation + changes, and uses [RSVP-TE], for example, to determine if link + bandwidth can be allocated to a CT. Bandwidth allocated to + individual CTs is protected as needed, but otherwise it is shared. + Under normal, non-congested network conditions, all CTs/services + fully share all available bandwidth. When congestion occurs for a + particular CTc, bandwidth reservation acts to prohibit traffic from + other CTs from seizing the allocated capacity for CTc. Associated + with each CT is the allocated bandwidth constraint (BCc) which + governs bandwidth allocation and protection; these parameters are + illustrated with examples in this Appendix. + + In performing MAR bandwidth allocation for a given flow/LSP, the LER + first determines the egress LSR address, service-identity, and CT. + The connection request is allocated an equivalent bandwidth to be + routed on a particular CT. The LER then accesses the CT priority, + QoS/traffic parameters, and routing table between the LER and egress + LSR, and sets up the connection request using the MAR bandwidth + allocation rules. The LER selects a first-choice path and determines + if bandwidth can be allocated on the path based on the MAR bandwidth + allocation rules given in Section 4. If the first choice path has + insufficient bandwidth, the LER may then try alternate paths, and + again applies the MAR bandwidth allocation rules now described. + + MAR bandwidth allocation is done on a per-CT basis, in which + aggregated CT bandwidth is managed to meet the overall bandwidth + requirements of CT service needs. Individual flows/LSPs are + allocated bandwidth in the corresponding CT according to CT bandwidth + availability. A fundamental principle applied in MAR bandwidth + allocation methods is the use of bandwidth reservation techniques. + + Bandwidth reservation gives preference to the preferred traffic by + allowing it to seize idle bandwidth on a link more easily than the + non-preferred traffic. Burke [BUR] first analyzed bandwidth + reservation behavior from the solution of the birth-death equations + for the bandwidth reservation model. Burke's model showed the + relative lost-traffic level for preferred traffic, which is not + subject to bandwidth reservation restrictions, as compared to non- + preferred traffic, which is subject to the restrictions. Bandwidth + reservation protection is robust to traffic variations and provides + + + + + +Ash Experimental [Page 11] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + significant dynamic protection of particular streams of traffic. It + is widely used in large-scale network applications [ASH1, MUM, AKI, + KRU, NAK]. + + Bandwidth reservation is used in MAR bandwidth allocation to control + sharing of link bandwidth across different CTs. On a given link, a + small amount of bandwidth (RBW_THRES) is reserved (perhaps 1% of the + total link bandwidth), and the reservation bandwidth can be accessed + when a given CT has reserved bandwidth-in-progress (RESERVED_BW) + below its allocated bandwidth (BC). That is, if the available link + bandwidth (unreserved idle link bandwidth UNRESERVED_BW) exceeds + RBW_THRES, then any CT is free to access the available bandwidth on + the link. However, if UNRESERVED_BW is less than RBW_THRES, then the + CT can utilize the available bandwidth only if its current bandwidth + usage is below the allocated amount (BC). In this way, bandwidth can + be fully shared among CTs if available, but it is protected by + bandwidth reservation if below the reservation level. + + Through the bandwidth reservation mechanism, MAR bandwidth allocation + also gives preference to high-priority CTs, in comparison to normal- + priority and best-effort priority CTs. + + Hence, bandwidth allocated to each CT is protected by bandwidth + reservation methods, as needed, but otherwise shared. Each LER + monitors CT bandwidth use on each CT, and determines if connection + requests can be allocated to the CT bandwidth. For example, for a + bandwidth request of DBW on a given flow/LSP, the LER determines the + CT priority (high, normal, or best-effort), CT bandwidth-in-use, and + CT bandwidth allocation thresholds, and uses these parameters to + determine the allowed load state threshold to which capacity can be + allocated. In allocating bandwidth DBW to a CT on given LSP (for + example, A-B-E), each link in the path is checked for available + bandwidth in comparison to the allowed load state. If bandwidth is + unavailable on any link in path A-B-E, another LSP could be tried, + such as A-C-D-E. Hence, determination of the link load state is + necessary for MAR bandwidth allocation, and two link load states are + distinguished: available (non-reserved) bandwidth (ABW_STATE), and + reserved-bandwidth (RBW_STATE). Management of CT capacity uses the + link state and the allowed load state threshold to determine if a + bandwidth allocation request can be accepted on a given CT. + +A.2. Analysis of MAR Performance + + In this Appendix, modeling analysis is presented in which MAR + bandwidth allocation is shown to provide good network performance, + relative to full sharing models, under normal and abnormal operating + conditions. A large-scale Diffserv-aware MPLS traffic engineering + simulation model is used, in which several CTs with different + + + +Ash Experimental [Page 12] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + priority classes share the pool of bandwidth on a multiservice, + integrated voice/data network. MAR methods have also been analyzed + in practice for networks that use time division multiplexing (i.e., + TDM-based networks) [ASH1], and in modeling studies for IP-based + networks [ASH2, ASH3, E.360]. + + All Bandwidth Constraints Models should meet these objectives: + + 1. applies equally when preemption is either enabled or disabled + (when preemption is disabled, the model still works 'reasonably' + well), + + 2. bandwidth efficiency, i.e., good bandwidth sharing among CTs under + both normal and overload conditions, + + 3. bandwidth isolation, i.e., a CT cannot hog the bandwidth of + another CT under overload conditions, + + 4. protection against QoS degradation, at least of the high-priority + CTs (e.g., high-priority voice, high-priority data, etc.), and + + 5. reasonably simple, i.e., does not require additional IGP + extensions and minimizes signaling load processing requirements. + + The use of any given Bandwidth Constraints Model has significant + impacts on the performance of a network, as explained later. + Therefore, the criteria used to select a model need to enable us to + evaluate how a particular model delivers its performance, relative to + other models. Lai [LAI, DSTE-PERF] has analyzed the MAM and RDM + Models and provided valuable insights into the relative performance + of these models under various network conditions. + + In environments where preemption is not used, MAM is attractive + because a) it is good at achieving isolation, and b) it achieves + reasonable bandwidth efficiency with some QoS degradation of lower + classes. When preemption is used, RDM is attractive because it can + achieve bandwidth efficiency under normal load. However, RDM cannot + provide service isolation under high load or when preemption is not + used. + + Our performance analysis of MAR bandwidth allocation methods is based + on a full-scale, 135-node simulation model of a national network, + combined with a multiservice traffic demand model to study various + scenarios and tradeoffs [ASH3, E.360]. Three levels of traffic + priority -- high, normal, and best effort -- are given across 5 CTs: + normal priority voice, high priority voice, normal priority data, + high priority data, and best effort data. + + + + +Ash Experimental [Page 13] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + The performance analyses for overloads and failures include a) the + MAR Bandwidth Constraints Model, as specified in Section 4, b) the + MAM Bandwidth Constraints Model, and c) the No-DSTE Bandwidth + Constraints Model. + + The allocated bandwidth constraints for MAR are described in Section + 5 as: + + Normal priority CTs: BCck = PROPORTIONAL_BWk, + High priority CTs: BCck = FACTOR X PROPORTIONAL_BWk + Best-effort priority CTs: BCck = 0 + + In the MAM Bandwidth Constraints Model, the bandwidth constraints for + each CT are set to a multiple of the proportional bandwidth + allocation: + + Normal priority CTs: BCck = FACTOR1 X PROPORTIONAL_BWk, + High priority CTs: BCck = FACTOR2 X PROPORTIONAL_BWk + Best-effort priority CTs: BCck = 0 + + Simulations show that for MAM, the sum (BCc) should exceed + MAX_RESERVABLE_BWk for better efficiency, as follows: + + 1. The normal priority CTs and the BCc values need to be over- + allocated to get reasonable performance. It was found that over- + allocating by 100% (i.e., setting FACTOR1 = 2), gave reasonable + performance. + + 2. The high priority CTs can be over-allocated by a larger multiple + FACTOR2 in MAM and this gives better performance. + + The rather large amount of over-allocation improves efficiency, but + somewhat defeats the 'bandwidth protection/isolation' needed with a + BC Model, because one CT can now invade the bandwidth allocated to + another CT. Each CT is restricted to its allocated bandwidth + constraint BCck, which is the maximum level of bandwidth allocated to + each CT on each link, as in normal operation of MAM. + + In the No-DSTE Bandwidth Constraints Model, no reservation or + protection of CT bandwidth is applied, and bandwidth allocation + requests are admitted if bandwidth is available. Furthermore, no + queuing priority is applied to any of the CTs in the No-DSTE + Bandwidth Constraints Model. + + Table 2 gives performance results for a six-times overload on a + single network node at Oakbrook, Illinois. The numbers given in the + table are the total network percent lost (i.e., blocked) or delayed + + + + +Ash Experimental [Page 14] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + traffic. Note that in the focused overload scenario studied here, + the percentage of lost/delayed traffic on the Oakbrook node is much + higher than the network-wide average values given. + + Table 2 + Performance Comparison for MAR, MAM, & No-DSTE + Bandwidth Constraints (BC) Models + 6X Focused Overload on Oakbrook + (Total Network % Lost/Delayed Traffic) + + Class Type MAR BC MAM BC No-DSTE BC + Model Model Model + NORMAL PRIORITY VOICE 0.00 1.97 10.30 + HIGH PRIORITY VOICE 0.00 0.00 7.05 + NORMAL PRIORITY DATA 0.00 6.63 13.30 + HIGH PRIORITY DATA 0.00 0.00 7.05 + BEST EFFORT PRIORITY DATA 12.33 11.92 9.65 + + Clearly the performance is better with MAR bandwidth allocation, and + the results show that performance improves when bandwidth reservation + is used. The reason for the poor performance of the No-DSTE Model, + without bandwidth reservation, is due to the lack of protection of + allocated bandwidth. If we add the bandwidth reservation mechanism, + then performance of the network is greatly improved. + + The simulations showed that the performance of MAM is quite sensitive + to the over-allocation factors discussed above. For example, if the + BCc values are proportionally allocated with FACTOR1 = 1, then the + results are much worse, as shown in Table 3: + + Table 3 + Performance Comparison for MAM Bandwidth Constraints Model + with Different Over-allocation Factors + 6X Focused Overload on Oakbrook + (Total Network % Lost/Delayed Traffic) + + Class Type (FACTOR1 = 1) (FACTOR1 = 2) + NORMAL PRIORITY VOICE 31.69 1.97 + HIGH PRIORITY VOICE 0.00 0.00 + NORMAL PRIORITY DATA 31.22 6.63 + HIGH PRIORITY DATA 0.00 0.00 + BEST EFFORT PRIORITY DATA 8.76 11.92 + + + + + + + + + +Ash Experimental [Page 15] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + Table 4 illustrates the performance of the MAR, MAM, and No-DSTE + Bandwidth Constraints Models for a high-day network load pattern with + a 50% general overload. The numbers given in the table are the total + network percent lost (i.e., blocked) or delayed traffic. + + Table 4 + Performance Comparison for MAR, MAM, & No-DSTE + Bandwidth Constraints (BC) Models + 50% General Overload (Total Network % Lost/Delayed Traffic) + + Class Type MAR BC MAM BC No-DSTE BC + Model Model Model + NORMAL PRIORITY VOICE 0.02 0.13 7.98 + HIGH PRIORITY VOICE 0.00 0.00 8.94 + NORMAL PRIORITY DATA 0.00 0.26 6.93 + HIGH PRIORITY DATA 0.00 0.00 8.94 + BEST EFFORT PRIORITY DATA 10.41 10.39 8.40 + + Again, we can see the performance is always better when MAR bandwidth + allocation and reservation is used. + + Table 5 illustrates the performance of the MAR, MAM, and No-DSTE + Bandwidth Constraints Models for a single link failure scenario (3 + OC-48). The numbers given in the table are the total network percent + lost (blocked) or delayed traffic. + + Table 5 + Performance Comparison for MAR, MAM, & No-DSTE + Bandwidth Constraints (BC) Models + Single Link Failure (2 OC-48) + (Total Network % Lost/Delayed Traffic) + + Class Type MAR BC MAM BC No-DSTE BC + Model Model Model + NORMAL PRIORITY VOICE 0.00 0.62 0.63 + HIGH PRIORITY VOICE 0.00 0.31 0.32 + NORMAL PRIORITY DATA 0.00 0.48 0.50 + HIGH PRIORITY DATA 0.00 0.31 0.32 + BEST EFFORT PRIORITY DATA 0.12 0.72 0.63 + + Again, we can see the performance is always better when MAR bandwidth + allocation and reservation is used. + + + + + + + + + +Ash Experimental [Page 16] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + Table 6 illustrates the performance of the MAR, MAM, and No-DSTE + Bandwidth Constraints Models for a multiple link failure scenario (3 + links with 3 OC-48, 3 OC-3, 4 OC-3 capacity, respectively). The + numbers given in the table are the total network percent lost + (blocked) or delayed traffic. + + Table 6 + Performance Comparison for MAR, MAM, & No-DSTE + Bandwidth Constraints (BC) Models + Multiple Link Failure + (3 Links with 2 OC-48, 2 OC-12, 1 OC-12, Respectively) + (Total Network % Lost/Delayed Traffic) + + Class Type MAR BC MAM BC No-DSTE BC + Model Model Model + NORMAL PRIORITY VOICE 0.00 0.91 0.92 + HIGH PRIORITY VOICE 0.00 0.44 0.44 + NORMAL PRIORITY DATA 0.00 0.70 0.72 + HIGH PRIORITY DATA 0.00 0.44 0.44 + BEST EFFORT PRIORITY DATA 0.14 1.03 1.04 + + Again, we can see the performance is always better when MAR bandwidth + allocation and reservation is used. + + Lai's results [LAI, DSTE-PERF] show the trade-off between bandwidth + sharing and service protection/isolation, using an analytic model of + a single link. He shows that RDM has a higher degree of sharing than + MAM. Furthermore, for a single link, the overall loss probability is + the smallest under full sharing and largest under MAM, with RDM being + intermediate. Hence, on a single link, Lai shows that the full + sharing model yields the highest link efficiency, while MAM yields + the lowest; and that full sharing has the poorest service protection + capability. + + The results of the present study show that, when considering a + network context in which there are many links and multiple-link + routing paths are used, full sharing does not necessarily lead to + maximum, network-wide bandwidth efficiency. In fact, the results in + Table 4 show that the No-DSTE Model not only degrades total network + throughput, but also degrades the performance of every CT that should + be protected. Allowing more bandwidth sharing may improve + performance up to a point, but it can severely degrade performance if + care is not taken to protect allocated bandwidth under congestion. + + Both Lai's study and this study show that increasing the degree of + bandwidth sharing among the different CTs leads to a tighter coupling + between CTs. Under normal loading conditions, there is adequate + capacity for each CT, which minimizes the effect of such coupling. + + + +Ash Experimental [Page 17] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + Under overload conditions, when there is a scarcity of capacity, such + coupling can cause severe degradation of service, especially for the + lower priority CTs. + + Thus, the objective of maximizing efficient bandwidth usage, as + stated in Bandwidth Constraints Model objectives, needs to be + exercised with care. Due consideration also needs to be given to + achieving bandwidth isolation under overload, in order to minimize + the effect of interactions among the different CTs. The proper + tradeoff of bandwidth sharing and bandwidth isolation needs to be + achieved in the selection of a Bandwidth Constraints Model. + Bandwidth reservation supports greater efficiency in bandwidth + sharing, while still providing bandwidth isolation and protection + against QoS degradation. + + In summary, the proposed MAR Bandwidth Constraints Model includes the + following: a) allocation of bandwidth to individual CTs, b) + protection of allocated bandwidth by bandwidth reservation methods, + as needed, but otherwise full sharing of bandwidth, c) + differentiation between high-priority, normal-priority, and best- + effort priority services, and d) provision of admission control to + reject connection requests, when needed, in order to meet performance + objectives. + + In the modeling results, the MAR Bandwidth Constraints Model compares + favorably with methods that do not use bandwidth reservation. In + particular, some of the conclusions from the modeling are as follows: + + o MAR bandwidth allocation is effective in improving performance over + methods that lack bandwidth reservation; this allows more bandwidth + sharing under congestion. + + o MAR achieves service differentiation for high-priority, normal- + priority, and best-effort priority services. + + o Bandwidth reservation supports greater efficiency in bandwidth + sharing while still providing bandwidth isolation and protection + against QoS degradation, and is critical to stable and efficient + network performance. + + + + + + + + + + + + +Ash Experimental [Page 18] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + +Appendix B. Bandwidth Prediction for Path Computation + + As discussed in [DSTE-PROTO], there are potential advantages for a + Head-end when predicting the impact of an LSP on the unreserved + bandwidth for computing the path of the LSP. One example would be to + perform better load-distribution of multiple LSPs across multiple + paths. Another example would be to avoid CAC rejection when the LSP + no longer fits on a link after establishment. + + Where such predictions are used on Head-ends, the optional Bandwidth + Constraints sub-TLV and the optional Maximum Reservable Bandwidth + sub-TLV MAY be advertised in the IGP. This can be used by Head-ends + to predict how an LSP affects unreserved bandwidth values. Such + predictions can be made with MAR by using the unreserved bandwidth + values advertised by the IGP, as discussed in Sections 2 and 4: + + UNRESERVED_BWck = MAX_RESERVABLE_BWk - UNRESERVED_BWk - + delta0/1(CTck) * RBW-THRESk + + where + + delta0/1(CTck) = 0 if RESERVED_BWck < BCck + delta0/1(CTck) = 1 if RESERVED_BWck >= BCck + + Furthermore, the following estimate can be made for RBW_THRESk: + + RBW_THRESk = RBW_% * MAX_RESERVABLE_BWk, + + where RBW_% is a locally configured variable, which could take on + different values for different link speeds. This information could + be used in conjunction with the BC sub-TLV, MAX_RESERVABLE_BW sub- + TLV, and UNRESERVED_BW sub-TLV to make predictions of available + bandwidth on each link for each CT. Because admission control + algorithms are left for vendor differentiation, predictions can only + be performed effectively when the Head-end LSR predictions are based + on the same (or a very close) admission control algorithm used by + other LSRs. + + LSPs may occasionally be rejected when head-ends are establishing + LSPs through a common link. As an example, consider some link L, and + two head-ends H1 and H2. If only H1 or only H2 is establishing LSPs + through L, then the prediction is accurate. But if both H1 and H2 + are establishing LSPs through L at the same time, the prediction + would not work perfectly. In other words, the CAC will occasionally + run into a rejected LSP on a link with such 'race' conditions. Also, + as mentioned in Appendix A, such a prediction is optional and outside + the scope of the document. + + + + +Ash Experimental [Page 19] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + +Normative References + + [DSTE-REQ] Le Faucheur, F. and W. Lai, "Requirements for Support + of Differentiated Services-aware MPLS Traffic + Engineering", RFC 3564, July 2003. + + [DSTE-PROTO] Le Faucheur, F., Ed., "Protocol Extensions for Support + of Diffserv-aware MPLS Traffic Engineering," RFC 4124, + June 2005. + + [RFC2119] Bradner, S., "Key words for Use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [IANA-CONS] Narten, T. and H. Alvestrand, "Guidelines for Writing + an IANA Considerations Section in RFCs", BCP 26, RFC + 2434, October 1998. + +Informative References + + [AKI] Akinpelu, J. M., "The Overload Performance of + Engineered Networks with Nonhierarchical & Hierarchical + Routing," BSTJ, Vol. 63, 1984. + + [ASH1] Ash, G. R., "Dynamic Routing in Telecommunications + Networks," McGraw-Hill, 1998. + + [ASH2] Ash, G. R., et al., "Routing Evolution in Multiservice + Integrated Voice/Data Networks," Proceeding of ITC-16, + Edinburgh, June 1999. + + [ASH3] Ash, G. R., "Performance Evaluation of QoS-Routing + Methods for IP-Based Multiservice Networks," Computer + Communications Magazine, May 2003. + + [BUR] Burke, P. J., Blocking Probabilities Associated with + Directional Reservation, unpublished memorandum, 1961. + + [DSTE-PERF] Lai, W., "Bandwidth Constraints Models for + Differentiated Services-aware MPLS Traffic Engineering: + Performance Evaluation", RFC 4128, June 2005. + + [E.360] ITU-T Recommendations E.360.1 - E.360.7, "QoS Routing & + Related Traffic Engineering Methods for Multiservice + TDM-, ATM-, & IP-Based Networks". + + [GMPLS-RECOV] Lang, J., et al., "Generalized MPLS Recovery Functional + Specification", Work in Progress. + + + + +Ash Experimental [Page 20] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + + [KRU] Krupp, R. S., "Stabilization of Alternate Routing + Networks", Proceedings of ICC, Philadelphia, 1982. + + [LAI] Lai, W., "Traffic Engineering for MPLS, Internet + Performance and Control of Network Systems III + Conference", SPIE Proceedings Vol. 4865, pp. 256-267, + Boston, Massachusetts, USA, 29 July-1 August 2002. + + [MAM] Le Faucheur, F., Lai, W., "Maximum Allocation Bandwidth + Constraints Model for Diffserv-aware MPLS Traffic + Engineering", RFC 4125, June 2005. + + [MPLS-BACKUP] Vasseur, J. P., et al., "MPLS Traffic Engineering Fast + Reroute: Bypass Tunnel Path Computation for Bandwidth + Protection", Work in Progress. + + [MUM] Mummert, V. S., "Network Management and Its + Implementation on the No. 4ESS, International Switching + Symposium", Japan, 1976. + + [NAK] Nakagome, Y., Mori, H., Flexible Routing in the Global + Communication Network, Proceedings of ITC-7, Stockholm, + 1973. + + [OSPF-TE] Katz, D., Kompella, K. and D. Yeung, "Traffic + Engineering (TE) Extensions to OSPF Version 2", RFC + 3630, September 2003. + + [RDM] Le Faucheur, F., Ed., "Russian Dolls Bandwidth + Constraints Model for Diffserv-aware MPLS Traffic + Engineering", RFC 4127, June 2005. + + [RSVP-TE] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, + V. and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP + Tunnels", RFC 3209, December 2001. + +Author's Address + + Jerry Ash + AT&T + Room MT D5-2A01 + 200 Laurel Avenue + Middletown, NJ 07748, USA + + Phone: +1 732-420-4578 + EMail: gash@att.com + + + + + +Ash Experimental [Page 21] + +RFC 4126 MAR Bandwidth Constraints Model for DS-TE June 2005 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2005). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + +Ash Experimental [Page 22] + |