diff options
Diffstat (limited to 'doc/rfc/rfc5865.txt')
-rw-r--r-- | doc/rfc/rfc5865.txt | 787 |
1 files changed, 787 insertions, 0 deletions
diff --git a/doc/rfc/rfc5865.txt b/doc/rfc/rfc5865.txt new file mode 100644 index 0000000..b4b6327 --- /dev/null +++ b/doc/rfc/rfc5865.txt @@ -0,0 +1,787 @@ + + + + + + +Internet Engineering Task Force (IETF) F. Baker +Request for Comments: 5865 J. Polk +Updates: 4542, 4594 Cisco Systems +Category: Standards Track M. Dolly +ISSN: 2070-1721 AT&T Labs + May 2010 + + + A Differentiated Services Code Point (DSCP) + for Capacity-Admitted Traffic + +Abstract + + This document requests one Differentiated Services Code Point (DSCP) + from the Internet Assigned Numbers Authority (IANA) for a class of + real-time traffic. This traffic class conforms to the Expedited + Forwarding Per-Hop Behavior. This traffic is also admitted by the + network using a Call Admission Control (CAC) procedure involving + authentication, authorization, and capacity admission. This differs + from a real-time traffic class that conforms to the Expedited + Forwarding Per-Hop Behavior but is not subject to capacity admission + or subject to very coarse capacity admission. + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc5865. + + + + + + + + + + + + + + + +Baker, et al. Standards Track [Page 1] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + This document may contain material from IETF Documents or IETF + Contributions published or made publicly available before November + 10, 2008. The person(s) controlling the copyright in some of this + material may not have granted the IETF Trust the right to allow + modifications of such material outside the IETF Standards Process. + Without obtaining an adequate license from the person(s) controlling + the copyright in such materials, this document may not be modified + outside the IETF Standards Process, and derivative works of it may + not be created outside the IETF Standards Process, except to format + it for publication as an RFC or to translate it into languages other + than English. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 + 1.2. Problem . . . . . . . . . . . . . . . . . . . . . . . . 6 + 2. Candidate Implementations of the Admitted Telephony + Service Class . . . . . . . . . . . . . . . . . . . . . . . 7 + 2.1. Potential implementations of EF in this model . . . . . . 7 + 2.2. Capacity admission control . . . . . . . . . . . . . . . 9 + 2.3. Recommendations on implementation of an Admitted + Telephony Service Class . . . . . . . . . . . . . . . . . 10 + 3. Summary: changes from RFC 4594 . . . . . . . . . . . . . . . 11 + 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 12 + 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 12 + 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 + 7.1. Normative References . . . . . . . . . . . . . . . . . . 13 + 7.2. Informative References . . . . . . . . . . . . . . . . . 13 + + + + + + +Baker, et al. Standards Track [Page 2] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + +1. Introduction + + This document requests one Differentiated Services Code Point (DSCP) + from the Internet Assigned Numbers Authority (IANA) for a class of + real-time traffic. This class conforms to the Expedited Forwarding + (EF) [RFC3246] [RFC3247] Per-Hop Behavior. It is also admitted using + a CAC procedure involving authentication, authorization, and capacity + admission. This differs from a real-time traffic class that conforms + to the Expedited Forwarding Per-Hop Behavior but is not subject to + capacity admission or subject to very coarse capacity admission. + + In addition, this document recommends that certain classes of video + described in [RFC4594] be treated as requiring capacity admission. + + Real-time traffic flows have one or more potential congestion points + between the endpoints. Reserving capacity for these flows is + important to application performance. All of these applications have + low tolerance to jitter (aka delay variation) and loss, as summarized + in Section 2, and most (except for multimedia conferencing) have + inelastic flow behavior from Figure 1 of [RFC4594]. Inelastic flow + behavior and low jitter/loss tolerance are the service + characteristics that define the need for admission control behavior. + + One of the reasons behind the requirement for capacity admission is + the need for classes of traffic that are handled under special + policies. Service providers need to distinguish between special- + policy traffic and other classes, particularly the existing Voice + over IP (VoIP) services that perform no capacity admission or only + very coarse capacity admission and can exceed their allocated + resources. + + The requested DSCP applies to the Telephony Service Class described + in [RFC4594]. + + Since video classes have not had the history of mixing admitted and + non-admitted traffic in the same Per-Hop Behavior (PHB) as has + occurred for EF, an additional DSCP code point is not recommended + within this document for video. Instead, the recommended "best + practice" is to perform admission control for all traffic in three of + the video classes from [RFC4594]: + + o The Interactive Real-Time Traffic (CS4, used for Video + conferencing and Interactive gaming), + + o The Broadcast TV (CS3) for use in a video on demand context, and + + o The AF4 Multimedia Conferencing (video conferencing). + + + + +Baker, et al. Standards Track [Page 3] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + Other video classes are believed not to have the current problem of + confusion with unadmitted traffic and therefore would not benefit + from the notion of a separate DSCP for admitted traffic. Within an + ISP and on inter-ISP links (i.e., within networks whose internal + paths are uniform at hundreds of megabits per second or faster), one + would expect all of this traffic to be carried in the Real-Time + Traffic (RTP) class described in [RFC5127]. + +1.1. Definitions + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [RFC2119]. + + The following terms and acronyms are used in this document. + + PHB: A Per-Hop Behavior (PHB) is the externally observable + forwarding behavior applied at a Differentiated Services + compliant node to a DS behavior aggregate [RFC2475]. It may + be thought of as a program configured on the interface of an + Internet host or router, specified in terms of drop + probabilities, queuing priorities or rates, and other handling + characteristics for the traffic class. + + DSCP: The Differentiated Services Code Point (DSCP), as defined in + [RFC2474], is a value that is encoded in the DS field, and + that each DS Node MUST use to select the PHB that is to be + experienced by each packet it forwards [RFC3260]. It is a + 6-bit number embedded into the 8-bit TOS (type of service) + field of an IPv4 datagram or the Traffic Class field of an + IPv6 datagram. + + CAC: Call Admission Control includes concepts of authorization and + capacity admission. "Authorization" refers to any procedure + that identifies a user, verifies the authenticity of the + identification, and determines whether the user is authorized + to use the service under the relevant policy. "Capacity + Admission" refers to any procedure that determines whether + capacity exists supporting a session's requirements under some + policy. + + In the Internet, these are separate functions; while in the + Public Switched Telephone Network (PSTN), they and call + routing are carried out together. + + + + + + + +Baker, et al. Standards Track [Page 4] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + UNI: A User/Network Interface (UNI) is the interface (often a + physical link or its virtual equivalent) that connects two + entities that do not trust each other, and in which one (the + user) purchases connectivity services from the other (the + network). + + Figure 1 shows two user networks connected by what appears to + each of them to be a single network ("The Internet", access to + which is provided by their service provider) that provides + connectivity services to other users. + + UNIs tend to be the bottlenecks in the Internet, where users + purchase relatively low amounts of bandwidth for cost or + service reasons, and as a result are most subject to + congestion issues and therefore issues requiring traffic + conditioning and service prioritization. + + NNI: A Network/Network Interface (NNI) is the interface (often a + physical link or its virtual equivalent) that connects two + entities that trust each other within limits, and in which the + two are seen as trading services for value. Figure 1 shows + three service networks that together provide the connectivity + services that we call "the Internet". They are different + administrations and are very probably in competition, but + exchange contracts for connectivity and capacity that enable + them to offer specific services to their customers. + + NNIs may not be bottlenecks in the Internet if service + providers contractually agree to provision excess capacity at + them, as they commonly do. However, NNI performance may + differ by ISP, and the performance guarantee interval may + range from a month to a much shorter period. Furthermore, a + peering point NNI may not have contractual performance + guarantees or may become overloaded under certain conditions. + They are also policy-controlled interfaces, especially in BGP. + As a result, they may require a traffic prioritization policy. + + Queue: There are multiple ways to build a multi-queue scheduler. + Weighted Round Robin (WRR) literally builds multiple lists and + visits them in a specified order, while a calendar queue + (often used to implement Weighted Fair Queuing, or WFQ) builds + a list for each time interval and queues at most a stated + amount of data in each such list for transmission during that + time interval. While these differ dramatically in + implementation, the external difference in behavior is + generally negligible when they are properly configured. + Consistent with the definitions used in the Differentiated + Services Architecture [RFC2475], these are treated as + + + +Baker, et al. Standards Track [Page 5] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + equivalent in this document, and the lists of WRR and the + classes of a calendar queue will be referred to uniformly as + "queues". + + _.--------. + ,-'' `--. + ,-' `-. + ,-------. ,',-------. `. + ,' `. ,',' `. `. + / User \ UNI / / Service \ \ + ( Network +-----+ Network ) `. + \ / ; \ / : + `. ,' ; `. .+ : + '-------' / '-------' \ NNI \ + ; \ : + ; "The Internet" \ ,-------. : + ; +' `. : + UNI: User/Network Interface / Service \ | + | ( Network ) | + NNI: Network/Network Interface \ / | + : +. ,' ; + : / '-------' ; + : / ; + ,-------. \ ,-------. / NNI / + ,' `. : ,' `+ ; + / User \ UNI / Service \ ; + ( Network +-----+ Network ) ,' + \ / \ \ / / + `. ,' `.`. ,' ,' + '-------' `.'-------' ,' + `-. ,-' + `--. _.-' + `--------'' + + Figure 1: UNI and NNI Interfaces + +1.2. Problem + + In short, the Telephony Service Class, described in [RFC4594], + permits the use of capacity admission in implementing the service, + but present implementations either provide no capacity admission + services or do so in a manner that depends on specific traffic + engineering. In the context of the Internet backbone, the two are + essentially equivalent; the edge network depends on specific + engineering by the service provider that might not be present, + especially in a mobile environment. + + + + + +Baker, et al. Standards Track [Page 6] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + However, services are being requested of the network that would + specifically make use of capacity admission, and would distinguish + among users or the uses of available Voice-over-IP or Video-over-IP + capacity in various ways. Various agencies would like to provide + services as described in RFC [RFC4190] or in Section 2.6 of + [RFC4504]. + + This requires the use of capacity admission to differentiate among + users to provide services to them that are not afforded to non- + capacity admitted customer-to-customer IP telephony sessions. + +2. Candidate Implementations of the Admitted Telephony Service Class + +2.1. Potential Implementations of EF in This Model + + There are at least two possible ways to implement isolation between + the Capacity Admitted PHB and the Expedited Forwarding PHB in this + model. They are to implement separate classes as a set of + + o Multiple data plane traffic classes, each consisting of a policer + and a queue, with the queues enjoying different priorities, or + + o Multiple data plane traffic classes, each consisting of a policer + but feeding into a common queue or multiple queues at the same + priority. + + We will explain the difference and describe in what way they differ + in operation. The reason this is necessary is that there is current + confusion in the industry. + + The multi-priority model is shown in Figure 2. In this model, + traffic from each service class is placed into a separate priority + queue. If data is present in more than one queue, traffic from one + of them will always be selected for transmission. This has the + effect of transferring jitter from the higher-priority queue to the + lower-priority queues, and reordering traffic in a way that gives the + higher-priority traffic a smaller average queuing delay. Each queue + must have its own policer, however, to protect the network from + errors and attacks; if a traffic class thinks it is carrying a + certain data rate but an abuse sends significantly more, the effect + of simple prioritization would not preserve the lower priorities of + traffic, which could cause routing to fail or otherwise impact a + service level agreement (SLA). + + + + + + + + +Baker, et al. Standards Track [Page 7] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + . + policers priorities |`. + Admitted EF <=> ----------||----+ `. + high| `. + Unadmitted EF <=> ----------||----+ .'----------- + . medium .' + rate queues |`. +-----+ .' Priority + AF1------>||----+ `. / low |' Scheduler + | `. / + AF2------>||----+ .'-+ + | .' + CS0------>||----+ .' Rate Scheduler + |' (WFQ, WRR, etc.) + + Figure 2: Implementation as a Data Plane Priority + + The multi-policer model is shown in Figure 3. In this model, traffic + from each service class is policed according to its SLA requirements, + and then placed into a common priority queue. Unlike the multi- + priority model, the jitter experienced by the traffic classes in this + case is the same, as there is only one queue, but the sum of the + traffic in this higher-priority queue experiences less average jitter + than the elastic traffic in the lower-priority. + + policers priorities . + Admitted EF <=> -------\ |`. + --||----+ `. + Unadmitted EF <=> -------/ high| `. + . | .'-------- + rate queues |`. +-----+ .' + AF1------>||----+ `. / low | .' Priority + | `. / |' Scheduler + AF2------>||----+ .'-+ + | .' + CS0------>||----+ .' Rate Scheduler + |' (WFQ, WRR, etc.) + + Figure 3: Implementation as a Data Plane Policer + + The difference between the two operationally is, as stated, the + issues of loss due to policing and distribution of jitter. + + If the two traffic classes are, for example, voice and video, + datagrams containing video data can be relatively large (often of + variable sizes up to the path MTU), while datagrams containing voice + are relatively small, on the order of only 40 to 200 bytes, depending + on the codec. On lower-speed links (less than 10 MBPS), the jitter + introduced by video to voice can be disruptive, while at higher + + + +Baker, et al. Standards Track [Page 8] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + speeds, the jitter is nominal compared to the jitter requirements of + voice. Therefore, at access network speeds, [RFC4594] recommends the + separation of video and voice into separate queues, while at optical + speeds, [RFC5127] recommends that they use a common queue. + + If, on the other hand, the two traffic classes are carrying the same + type of application with the same jitter requirements, then giving + one preference in this sense does not benefit the higher-priority + traffic and may harm the lower-priority traffic. In such a case, + using separate policers and a common queue is a superior approach. + +2.2. Capacity Admission Control + + There are at least six major ways that capacity admission is done or + has been proposed to be done for real-time applications. Each will + be described below, and Section 3 will judge which ones are likely to + meet the requirements of the Admitted Telephony service class. These + include: + + o Drop Precedence used to force sessions to voluntarily exit, + + o Capacity admission control by assumption or engineering, + + o Capacity admission control by call counting, + + o Endpoint capacity admission performed by probing the network, + + o Centralized capacity admission control via bandwidth broker, and + + o Distributed capacity admission control using protocols such as + Resource Reservation Protocol (RSVP) or Next Steps in Signaling + (NSIS). + + The problem with dropping traffic to force users to hang up is that + it affects a broad class of users -- if there is capacity for N calls + and the N+1 calls are active, data is dropped randomly from all + sessions to ensure that offered load doesn't exceed capacity. On + very fast links, that is acceptable, but on lower speed links it can + seriously affect call quality. There is also a behavioral issue + involved here, in which users who experience poor quality calls tend + to hang up and call again, making the problem better -- then worse. + + The problem with capacity admission by assumption, which is widely + deployed in today's VoIP environment, is that it depends on the + assumptions made. One can do careful traffic engineering to ensure + needed bandwidth, but this can also be painful, and has to be + revisited when the network is changed or network usage changes. + + + + +Baker, et al. Standards Track [Page 9] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + The problem with call-counting-based admission control is that it + gets exponentially worse the farther you get from the control point + (e.g., it lacks sufficient scalability on the outskirts of the + network). + + There are two fundamental problems with depending on the endpoint to + perform capacity admission: it may not be able to accurately measure + the impact of the traffic it generates on the network, and it tends + to be greedy (e.g., it doesn't care). If the network operator is + providing a service, he must be able to guarantee the service, which + means that he cannot trust systems that are not controlled by his + network. + + The problem with capacity controls via a bandwidth broker is that + centralized servers lack far away awareness, and also lack effective + real-time reaction to dynamic changes in all parts of the network at + all instances of time. + + The problem with mechanisms that do not enable the association of a + policy with the request is that they do not allow for multi-policy + services, which are becoming important. + + The operator's choice of admission procedure MUST, for this DSCP, + ensure the following: + + o The actual links that a session uses have enough bandwidth to + support it. + + o New sessions are refused admission if there is inadequate + bandwidth under the relevant policy. + + o A user is identified and the correct policy is applied if multiple + policies are in use in a network. + + o Under periods of network stress, the process of admission of new + sessions does not disrupt existing sessions, unless the service + explicitly allows for disruption of calls. + +2.3. Recommendations on Implementation of an Admitted Telephony + Service Class + + When coupled with adequate Authentication, Authorization, and + Accounting (AAA) and capacity admission procedures as described in + Section 2.2, either of the two PHB implementations described in + Section 2.1 is sufficient to provide the services required for an + Admitted Telephony service class. If preemption is required, Section + 2.3.5.2 of [RFC4542] provides the tools for carrying out the + preemption. If preemption is not in view, or if used in addition to + + + +Baker, et al. Standards Track [Page 10] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + preemptive services, the application of different thresholds + depending on call precedence has the effect of improving the + probability of call completion by admitting preferred calls at a time + when other calls are being refused. Routine and priority traffic can + be admitted using the same DSCP value, as the choice of which calls + are admitted is handled in the admission procedure executed in the + control plane, not the policing of the data plane. + + On the point of what protocols and procedures are required for + authentication, authorization, and capacity admission, we note that + clear standards do not exist at this time for bandwidth brokers, NSIS + has not been finalized at this time and in any event is limited to + unicast sessions, and that RSVP has been standardized and has the + relevant services. We therefore RECOMMEND the use of a protocol, + such as RSVP, at the UNI. Procedures at the NNI are business matters + to be discussed between the relevant networks, and are RECOMMENDED + but NOT REQUIRED. + +3. Summary: Changes from RFC 4594 + + To summarize, there are two changes to [RFC4594] discussed in this + document: + + Telephony class: The Telephony Service Class in RFC 4594 does not + involve capacity admission, but depends on + application layer admission that only estimates + capacity, and does that through static engineering. + In addition to that class, a separate Admitted + Telephony Class is added that performs capacity + admission dynamically. + + Video classes: Capacity admission is added to three video classes. + These are the Interactive Real-Time Traffic class, + Broadcast TV class when used for video on demand, + and the Multimedia Conferencing class. + +4. IANA Considerations + + IANA assigned a DSCP value to a second EF traffic class consistent + with [RFC3246] and [RFC3247] in the "Differentiated Services Field + Codepoints" registry. It implements the Telephony Service Class + described in [RFC4594] at lower speeds and is included in the Real- + Time Treatment Aggregate [RFC5127] at higher speeds. The code point + value should be from pool 1 within the dscp-registry. The value is + parallel with the existing EF code point (101110), as IANA assigned + + + + + + +Baker, et al. Standards Track [Page 11] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + the code point 101100 -- keeping the (left-to-right) first 4 binary + values the same in both. The code point described in this document + is referred to as VOICE-ADMIT and has been registered as follows: + + Sub-registry: Pool 1 Codepoints + Reference: [RFC2474] + Registration Procedures: Standards Action + + Registry: + Name Space Reference + --------- ------- --------- + VOICE-ADMIT 101100 [RFC5865] + + This traffic class REQUIRES the use of capacity admission, such as + RSVP services together with AAA services, at the User/Network + Interface (UNI); the use of such services at the NNI is at the option + of the interconnected networks. + +5. Security Considerations + + A major requirement of this service is effective use of a signaling + protocol, such as RSVP, with the capabilities to identify its user as + either an individual or a member of some corporate entity, and assert + a policy such as "normal", "routine", or some level of "priority". + + This capability, one has to believe, will be abused by script kiddies + and others if the proof of identity is not adequately strong or if + policies are written or implemented improperly by the carriers. This + goes without saying, but this section is here for it to be said. + + Many of the security considerations from RFC 3246 [RFC3246] apply to + this document, as well as the security considerations in RFC 2474 and + RFC 4542. RFC 4230 [RFC4230] analyzes RSVP, providing some gap + analysis to the NSIS WG as they started their work. Keep in mind + that this document is advocating RSVP at the UNI only, while RFC 4230 + discusses (mostly) RSVP from a more complete point of view (i.e., e2e + and edge2edge). When considering the RSVP aspect of this document, + understanding Section 6 of RFC 4230 is a good source of information. + +6. Acknowledgements + + Kwok Ho Chan, Georgios Karagiannis, Dan Voce, and Bob Briscoe + commented and offered text. The impetus for including video in the + discussion, which initially only targeted voice, is from Dave + McDysan. + + + + + + +Baker, et al. Standards Track [Page 12] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + +7. References + +7.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, December + 1998. + + [RFC3246] Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, + J., Courtney, W., Davari, S., Firoiu, V., and D. + Stiliadis, "An Expedited Forwarding PHB (Per-Hop + Behavior)", RFC 3246, March 2002. + +7.2. Informative References + + [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., + and W. Weiss, "An Architecture for Differentiated + Service", RFC 2475, December 1998. + + [RFC3247] Charny, A., Bennet, J., Benson, K., Boudec, J., Chiu, A., + Courtney, W., Davari, S., Firoiu, V., Kalmanek, C., and K. + Ramakrishnan, "Supplemental Information for the New + Definition of the EF PHB (Expedited Forwarding Per-Hop + Behavior)", RFC 3247, March 2002. + + [RFC3260] Grossman, D., "New Terminology and Clarifications for + Diffserv", RFC 3260, April 2002. + + [RFC4190] Carlberg, K., Brown, I., and C. Beard, "Framework for + Supporting Emergency Telecommunications Service (ETS) in + IP Telephony", RFC 4190, November 2005. + + [RFC4504] Sinnreich, H., Ed., Lass, S., and C. Stredicke, "SIP + Telephony Device Requirements and Configuration", RFC + 4504, May 2006. + + [RFC4542] Baker, F. and J. Polk, "Implementing an Emergency + Telecommunications Service (ETS) for Real-Time Services in + the Internet Protocol Suite", RFC 4542, May 2006. + + [RFC4594] Babiarz, J., Chan, K., and F. Baker, "Configuration + Guidelines for DiffServ Service Classes", RFC 4594, August + 2006. + + + + +Baker, et al. Standards Track [Page 13] + +RFC 5865 DSCP for Capacity-Admitted Traffic May 2010 + + + [RFC5127] Chan, K., Babiarz, J., and F. Baker, "Aggregation of + DiffServ Service Classes", RFC 5127, February 2008. + + [RFC4230] Tschofenig, H. and R. Graveman, "RSVP Security + Properties", RFC 4230, December 2005. + +Authors' Addresses + + Fred Baker + Cisco Systems + Santa Barbara, California 93117 + USA + + Phone: +1-408-526-4257 + EMail: fred@cisco.com + + + James Polk + Cisco Systems + Richardson, Texas 75082 + USA + + Phone: +1-817-271-3552 + EMail: jmpolk@cisco.com + + + Martin Dolly + AT&T Labs + Middletown Township, New Jersey 07748 + USA + + Phone: +1-732-420-4574 + EMail: mdolly@att.com + + + + + + + + + + + + + + + + + + +Baker, et al. Standards Track [Page 14] + |