From 4bfd864f10b68b71482b35c818559068ef8d5797 Mon Sep 17 00:00:00 2001 From: Thomas Voss Date: Wed, 27 Nov 2024 20:54:24 +0100 Subject: doc: Add RFC documents --- doc/rfc/rfc2990.txt | 1347 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 1347 insertions(+) create mode 100644 doc/rfc/rfc2990.txt (limited to 'doc/rfc/rfc2990.txt') diff --git a/doc/rfc/rfc2990.txt b/doc/rfc/rfc2990.txt new file mode 100644 index 0000000..f4190b4 --- /dev/null +++ b/doc/rfc/rfc2990.txt @@ -0,0 +1,1347 @@ + + + + + + +Network Working Group G. Huston +Request for Comments: 2990 Telstra +Category: Informational November 2000 + + + Next Steps for the IP QoS Architecture + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2000). All Rights Reserved. + +Abstract + + While there has been significant progress in the definition of + Quality of Service (QoS) architectures for internet networks, there + are a number of aspects of QoS that appear to need further + elaboration as they relate to translating a set of tools into a + coherent platform for end-to-end service delivery. This document + highlights the outstanding architectural issues relating to the + deployment and use of QoS mechanisms within internet networks, noting + those areas where further standards work may assist with the + deployment of QoS internets. + + This document is the outcome of a collaborative exercise on the part + of the Internet Architecture Board. + +Table of Contents + + 1. Introduction ........................................... 2 + 2. State and Stateless QoS ................................ 4 + 3. Next Steps for QoS Architectures ....................... 6 + 3.1 QoS-Enabled Applications ........................... 7 + 3.2 The Service Environment ............................ 9 + 3.3 QoS Discovery ...................................... 10 + 3.4 QoS Routing and Resource Management ................ 10 + 3.5 TCP and QoS ........................................ 11 + 3.6 Per-Flow States and Per-Packet classifiers ......... 13 + 3.7 The Service Set .................................... 14 + 3.8 Measuring Service Delivery ......................... 14 + 3.9 QoS Accounting ..................................... 15 + 3.10 QoS Deployment Diversity .......................... 16 + 3.11 QoS Inter-Domain signaling ........................ 17 + + + +Huston Informational [Page 1] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + 3.12 QoS Deployment Logistics .......................... 17 + 4. The objective of the QoS architecture .................. 18 + 5. Towards an end-to-end QoS architecture ................. 19 + 6. Conclusions ............................................ 21 + 7. Security Considerations ................................ 21 + 8. References ............................................. 22 + 9. Acknowledgments ........................................ 23 + 10. Author's Address ....................................... 23 + 11. Full Copyright Statement ............................... 24 + +1. Introduction + + The default service offering associated with the Internet is + characterized as a best-effort variable service response. Within + this service profile the network makes no attempt to actively + differentiate its service response between the traffic streams + generated by concurrent users of the network. As the load generated + by the active traffic flows within the network varies, the network's + best effort service response will also vary. + + The objective of various Internet Quality of Service (QoS) efforts is + to augment this base service with a number of selectable service + responses. These service responses may be distinguished from the + best-effort service by some form of superior service level, or they + may be distinguished by providing a predictable service response + which is unaffected by external conditions such as the number of + concurrent traffic flows, or their generated traffic load. + + Any network service response is an outcome of the resources available + to service a load, and the level of the load itself. To offer such + distinguished services there is not only a requirement to provide a + differentiated service response within the network, there is also a + requirement to control the service-qualified load admitted into the + network, so that the resources allocated by the network to support a + particular service response are capable of providing that response + for the imposed load. This combination of admission control agents + and service management elements can be summarized as "rules plus + behaviors". To use the terminology of the Differentiated Service + architecture [4], this admission control function is undertaken by a + traffic conditioner (an entity which performs traffic conditioning + functions and which may contain meters, markers, droppers, and + shapers), where the actions of the conditioner are governed by + explicit or implicit admission control agents. + + As a general observation of QoS architectures, the service load + control aspect of QoS is perhaps the most troubling component of the + architecture. While there are a wide array of well understood + service response mechanisms that are available to IP networks, + + + +Huston Informational [Page 2] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + matching a set of such mechanisms within a controlled environment to + respond to a set of service loads to achieve a completely consistent + service response remains an area of weakness within existing IP QoS + architectures. The control elements span a number of generic + requirements, including end-to-end application signaling, end-to- + network service signaling and resource management signaling to allow + policy-based control of network resources. This control may also + span a particular scope, and use 'edge to edge' signaling, intended + to support particular service responses within a defined network + scope. + + One way of implementing this control of imposed load to match the + level of available resources is through an application-driven process + of service level negotiation (also known as application signaled + QoS). Here, the application first signals its service requirements + to the network, and the network responds to this request. The + application will proceed if the network has indicated that it is able + to carry the additional load at the requested service level. If the + network indicates that it cannot accommodate the service requirements + the application may proceed in any case, on the basis that the + network will service the application's data on a best effort basis. + This negotiation between the application and the network can take the + form of explicit negotiation and commitment, where there is a single + negotiation phase, followed by a commitment to the service level on + the part of the network. This application-signaled approach can be + used within the Integrated Services architecture, where the + application frames its service request within the resource + reservation protocol (RSVP), and then passes this request into the + network. The network can either respond positively in terms of its + agreement to commit to this service profile, or it can reject the + request. If the network commits to the request with a resource + reservation, the application can then pass traffic into the network + with the expectation that as long as the traffic remains within the + traffic load profile that was originally associated with the request, + the network will meet the requested service levels. There is no + requirement for the application to periodically reconfirm the service + reservation itself, as the interaction between RSVP and the network + constantly refreshes the reservation while it remains active. The + reservation remains in force until the application explicitly + requests termination of the reservation, or the network signals to + the application that it is unable to continue with a service + commitment to the reservation [3]. There are variations to this + model, including an aggregation model where a proxy agent can fold a + number of application-signaled reservations into a common aggregate + reservation along a common sub-path, and a matching deaggregator can + reestablish the collection of individual resource reservations upon + leaving the aggregate region [5]. The essential feature of this + Integrated Services model is the "all or nothing" nature of the + + + +Huston Informational [Page 3] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + model. Either the network commits to the reservation, in which case + the requestor does not have to subsequently monitor the network's + level of response to the service, or the network indicates that it + cannot meet the resource reservation. + + An alternative approach to load control is to decouple the network + load control function from the application. This is the basis of the + Differentiated Services architecture. Here, a network implements a + load control function as part of the function of admission of traffic + into the network, admitting no more traffic within each service + category as there are assumed to be resources in the network to + deliver the intended service response. Necessarily there is some + element of imprecision in this function given that traffic may take + an arbitrary path through the network. In terms of the interaction + between the network and the application, this takes the form of a + service request without prior negotiation, where the application + requests a particular service response by simply marking each packet + with a code to indicate the desired service. Architecturally, this + approach decouples the end systems and the network, allowing a + network to implement an active admission function in order to + moderate the workload that is placed upon the network's resources + without specific reference to individual resource requests from end + systems. While this decoupling of control allows a network's + operator greater ability to manage its resources and a greater + ability to ensure the integrity of its services, there is a greater + potential level of imprecision in attempting to match applications' + service requirements to the network's service capabilities. + +2. State and Stateless QoS + + These two approaches to load control can be characterized as state- + based and stateless approaches respectively. + + The architecture of the Integrated Services model equates the + cumulative sum of honored service requests to the current reserved + resource levels of the network. In order for a resource reservation + to be honored by the network, the network must maintain some form of + remembered state to describe the resources that have been reserved, + and the network path over which the reserved service will operate. + This is to ensure integrity of the reservation. In addition, each + active network element within the network path must maintain a local + state that allows incoming IP packets to be correctly classified into + a reservation class. This classification allows the packet to be + placed into a packet flow context that is associated with an + appropriate service response consistent with the original end-to-end + service reservation. This local state also extends to the function + + + + + +Huston Informational [Page 4] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + of metering packets for conformance on a flow-by-flow basis, and the + additional overheads associated with maintenance of the state of each + of these meters. + + In the second approach, that of a Differentiated Services model, the + packet is marked with a code to trigger the appropriate service + response from the network elements that handles the packet, so that + there is no strict requirement to install a per-reservation state on + these network elements. Also, the end application or the service + requestor is not required to provide the network with advance notice + relating to the destination of the traffic, nor any indication of the + intended traffic profile or the associated service profile. In the + absence of such information any form of per-application or per-path + resource reservation is not feasible. In this model there is no + maintained per-flow state within the network. + + The state-based Integrated Services architectural model admits the + potential to support greater level of accuracy, and a finer level of + granularity on the part of the network to respond to service + requests. Each individual application's service request can be used + to generate a reservation state within the network that is intended + to prevent the resources associated with the reservation to be + reassigned or otherwise preempted to service other reservations or to + service best effort traffic loads. The state-based model is intended + to be exclusionary, where other traffic is displaced in order to meet + the reservation's service targets. + + As noted in RFC2208 [2], there are several areas of concern about the + deployment of this form of service architecture. With regard to + concerns of per-flow service scalability, the resource requirements + (computational processing and memory consumption) for running per- + flow resource reservations on routers increase in direct proportion + to the number of separate reservations that need to be accommodated. + By the same token, router forwarding performance may be impacted + adversely by the packet-classification and scheduling mechanisms + intended to provide differentiated services for these resource- + reserved flows. This service architecture also poses some challenges + to the queuing mechanisms, where there is the requirement to allocate + absolute levels of egress bandwidth to individual flows, while still + supporting an unmanaged low priority best effort traffic class. + + The stateless approach to service management is more approximate in + the nature of its outcomes. Here there is no explicit negotiation + between the application's signaling of the service request and the + network's capability to deliver a particular service response. If + the network is incapable of meeting the service request, then the + request simply will not be honored. In such a situation there is no + requirement for the network to inform the application that the + + + +Huston Informational [Page 5] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + request cannot be honored, and it is left to the application to + determine if the service has not been delivered. The major attribute + of this approach is that it can possess excellent scaling properties + from the perspective of the network. If the network is capable of + supporting a limited number of discrete service responses, and the + routers uses per-packet marking to trigger the service response, then + the processor and memory requirements in each router do not increase + in proportion to the level of traffic passed through the router. Of + course this approach does introduce some degree of compromise in that + the service response is more approximate as seen by the end client, + and scaling the number of clients and applications in such an + environment may not necessarily result in a highly accurate service + response to every client's application. + + It is not intended to describe these service architectures in further + detail within this document. The reader is referred to RFC1633 [3] + for an overview of the Integrated Services Architecture (IntServ) and + RFC2475 [4] for an overview of the Differentiated Services + architecture (DiffServ). + + These two approaches are the endpoints of what can be seen as a + continuum of control models, where the fine-grained precision of the + per application invocation reservation model can be aggregated into + larger, more general and potentially more approximate aggregate + reservation states, and the end-to-end element-by-element reservation + control can be progressively approximated by treating a collection of + subnetworks or an entire transit network as an aggregate service + element. There are a number of work in progress efforts which are + directed towards these aggregated control models, including + aggregation of RSVP [5], the RSVP DCLASS Object [6] to allow + Differentiated Services Code Points (DSCPs) to be carried in RSVP + message objects, and operation of Integrated Services over + Differentiated Services networks [7]. + +3. Next Steps for QoS Architectures + + Both the Integrated Services architecture and the Differentiated + Services architecture have some critical elements in terms of their + current definition which appear to be acting as deterrents to + widespread deployment. Some of these issues will probably be + addressed within the efforts to introduce aggregated control and + response models into these QoS architectures, while others may + require further refinement through standards-related activities. + + + + + + + + +Huston Informational [Page 6] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + +3.1 QoS-Enabled Applications + + One of the basic areas of uncertainty with QoS architectures is + whether QoS is a per-application service, whether QoS is a + transport-layer option, or both. Per-application services have + obvious implications of extending the QoS architecture into some form + of Application Protocol Interface (API), so that applications could + negotiate a QoS response from the network and alter their behavior + according to the outcome of the response. Examples of this approach + include GQOS [8], and RAPI [9]. As a transport layer option, it + could be envisaged that any application could have its traffic + carried by some form of QoS-enabled network services by changing the + host configuration, or by changing the configuration at some other + network control point, without making any explicit changes to the + application itself. The strength of the transport layer approach is + that there is no requirement to substantially alter application + behavior, as the application is itself unaware of the + administratively assigned QoS. The weakness of this approach is that + the application is unable to communicate what may be useful + information to the network or to the policy systems that are managing + the network's service responses. In the absence of such information + the network may provide a service response that is far superior than + the application's true requirements, or far inferior than what is + required for the application to function correctly. An additional + weakness of a transport level approach refers to those class of + applications that can adapt their traffic profile to meet the + available resources within the network. As a transport level + mechanism, such network availability information as may be available + to the transport level is not passed back to the application. + + In the case of the Integrated Services architecture, this transport + layer approach does not appear to be an available option, as the + application does require some alteration to function correctly in + this environment. The application must be able to provide to the + service reservation module a profile of its anticipated traffic, or + in other words the application must be able to predict its traffic + load. In addition, the application must be able to share the + reservation state with the network, so that if the network state + fails, the application can be informed of the failure. The more + general observation is that a network can only formulate an accurate + response to an application's requirements if the application is + willing to offer precise statement of its traffic profile, and is + willing to be policed in order to have its traffic fit within this + profile. + + In the case of the Differentiated Services architecture there is no + explicit provision for the application to communicate with the + network regarding service levels. This does allow the use of a + + + +Huston Informational [Page 7] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + transport level option within the end system that does not require + explicit alteration of the application to mark its generated traffic + with one of the available Differentiated Services service profiles. + However, whether the application is aware of such service profiles or + not, there is no level of service assurance to the application in + such a model. If the Differentiated Services boundary traffic + conditioners enter a load shedding state, the application is not + signaled of this condition, and is not explicitly aware that the + requested service response is not being provided by the network. If + the network itself changes state and is unable to meet the cumulative + traffic loads admitted by the ingress traffic conditioners, neither + the ingress traffic conditioners, nor the client applications, are + informed of this failure to maintain the associated service quality. + While there is no explicit need to alter application behavior in this + architecture, as the basic DiffServ mechanism is one that is managed + within the network itself, the consequence is that an application may + not be aware whether a particular service state is being delivered to + the application. + + There is potential in using an explicit signaling model, such as used + by IntServ, but carrying a signal which allows the network to manage + the application's traffic within an aggregated service class [6]. + Here the application does not pass a complete picture of its intended + service profile to the network, but instead is providing some level + of additional information to the network to assist in managing its + resources, both in terms of the generic service class that the + network can associate with the application's traffic, and the + intended path of the traffic through the network. + + An additional factor for QoS enabled applications is that of receiver + capability negotiation. There is no value in the sender establishing + a QoS-enabled path across a network to the receiver if the receiver + is incapable of absorbing the consequent data flow. This implies + that QoS enabled applications also require some form of end-to-end + capability negotiation, possibly through a generic protocol to allow + the sender to match its QoS requirements to the minimum of the flow + resources that can be provided by the network and the flow resources + that can be processed by the receiver. In the case of the Integrated + services architecture the application end-to-end interaction can be + integrated into the RSVP negotiation. In the case of the + Differentiated Services architecture there is no clear path of + integrating such receiver control into the signaling model of the + architecture as it stands. + + If high quality services are to be provided, where `high quality' is + implied as being `high precision with a fine level of granularity', + then the implication is that all parts of the network that may be + involved with servicing the request either have to be over- + + + +Huston Informational [Page 8] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + provisioned such that no load state can compromise the service + quality, or the network element must undertake explicit allocation of + resources to each flow that is associated with each service request. + + For end-to-end service delivery it does appear that QoS architectures + will need to extend to the level of the application requesting the + service profile. It appears that further refinement of the QoS + architecture is required to integrate DiffServ network services into + an end-to-end service delivery model, as noted in [7]. + +3.2 The Service Environment + + The outcome of the considerations of these two approaches to QoS + architecture within the network is that there appears to be no single + comprehensive service environment that possesses both service + accuracy and scaling properties. + + The maintained reservation state of the Integrated Services + architecture and the end-to-end signaling function of RSVP are part + of a service management architecture, but it is not cost effective, + or even feasible, to operate a per-application reservation and + classification state across the high speed core of a network [2]. + + While the aggregated behavior state of the Differentiated Services + architecture does offer excellent scaling properties, the lack of + end-to-end signaling facilities makes such an approach one that + cannot operate in isolation within any environment. The + Differentiated Services architecture can be characterized as a + boundary-centric operational model. With this boundary-centric + architecture, the signaling of resource availability from the + interior of the network to the boundary traffic conditioners is not + defined, nor is the signaling from the traffic conditioners to the + application that is resident on the end system. This has been noted + as an additional work item in the IntServ operations over DiffServ + work, concerning "definition of mechanisms to efficiently and + dynamically provision resources in a DiffServ network region". This + might include protocols by which an "oracle" (...) conveys + information about resource availability within a DiffServ region to + border routers." [7] + + What appears to be required within the Differentiated Services + service model is both resource availability signaling from the core + of the network to the DiffServ boundary and some form of signaling + from the boundary to the client application. + + + + + + + +Huston Informational [Page 9] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + +3.3 QoS Discovery + + There is no robust mechanism for network path discovery with specific + service performance attributes. The assumption within both IntServ + and DiffServ architectures is that the best effort routing path is + used, where the path is either capable of sustaining the service + load, or not. + + Assuming that the deployment of service differentiating + infrastructure will be piecemeal, even if only in the initial stages + of a QoS rollout, such an assumption may be unwarranted. If this is + the case, then how can a host application determine if there is a + distinguished service path to the destination? No existing + mechanisms exist within either of these architectures to query the + network for the potential to support a specific service profile. Such + a query would need to examine a number of candidate paths, rather + than simply examining the lowest metric routing path, so that this + discovery function is likely to be associated with some form of QoS + routing functionality. + + From this perspective, there is still further refinement that may be + required in the model of service discovery and the associated task of + resource reservation. + +3.4 QoS Routing and Resource Management + + To date QoS routing has been developed at some distance from the task + of development of QoS architectures. The implicit assumption within + the current QoS architectural models is that the routing best effort + path will be used for both best effort traffic and distinguished + service traffic. + + There is no explicit architectural option to allow the network + service path to be aligned along other than the single best routing + metric path, so that available network resources can be efficiently + applied to meet service requests. Considerations of maximizing + network efficiency would imply that some form of path selection is + necessary within a QoS architecture, allowing the set of service + requirements to be optimally supported within the network's aggregate + resource capability. + + In addition to path selection, SPF-based interior routing protocols + allow for the flooding of link metric information across all network + elements. This mechanism appears to be a productive direction to + provide the control-level signaling between the interior of the + network and the network admission elements, allowing the admission + + + + + +Huston Informational [Page 10] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + systems to admit traffic based on current resource availability + rather than on necessarily conservative statically defined admission + criteria. + + There is a more fundamental issue here concerning resource management + and traffic engineering. The approach of single path selection with + static load characteristics does not match a networked environment + which contains a richer mesh of connectivity and dynamic load + characteristics. In order to make efficient use of a rich + connectivity mesh, it is necessary to be able to direct traffic with + a common ingress and egress point across a set of available network + paths, spreading the load across a broader collection of network + links. At its basic form this is essentially a traffic engineering + problem. To support this function it is necessary to calculate per- + path dynamic load metrics, and allow the network's ingress system the + ability to distribute incoming traffic across these paths in + accordance with some model of desired traffic balance. To apply this + approach to a QoS architecture would imply that each path has some + form of vector of quality attributes, and incoming traffic is + balanced across a subset of available paths where the quality + attribute of the traffic is matched with the quality vector of each + available path. This augmentation to the semantics of the traffic + engineering is matched by a corresponding shift in the calculation + and interpretation of the path's quality vector. In this approach + what needs to be measured is not the path's resource availability + level (or idle proportion), but the path's potential to carry + additional traffic at a certain level of quality. This potential + metric is one that allows existing lower priority traffic to be + displaced to alternative paths. The path's quality metric can be + interpreted as a metric describing the displacement capability of the + path, rather than a resource availability metric. + + This area of active network resource management, coupled with dynamic + network resource discovery, and the associated control level + signaling to network admission systems appears to be a topic for + further research at this point in time. + +3.5 TCP and QoS + + A congestion-managed rate-adaptive traffic flow (such as used by TCP) + uses the feedback from the ACK packet stream to time subsequent data + transmissions. The resultant traffic flow rate is an outcome of the + service quality provided to both the forward data packets and the + reverse ACK packets. If the ACK stream is treated by the network + with a different service profile to the outgoing data packets, it + remains an open question as to what extent will the data forwarding + service be compromised in terms of achievable throughput. High rates + of jitter on the ACK stream can cause ACK compression, that in turn + + + +Huston Informational [Page 11] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + will cause high burst rates on the subsequent data send. Such bursts + will stress the service capacity of the network and will compromise + TCP throughput rates. + + One way to address this is to use some form of symmetric service, + where the ACK packets are handled using the same service class as the + forward data packets. If symmetric service profiles are important + for TCP sessions, how can this be structured in a fashion that does + not incorrectly account for service usage? In other words, how can + both directions of a TCP flow be accurately accounted to one party? + + Additionally, there is the interaction between the routing system and + the two TCP data flows. The Internet routing architecture does not + intrinsically preserve TCP flow symmetry, and the network path taken + by the forward packets of a TCP session may not exactly correspond to + the path used by the reverse packet flow. + + TCP also exposes an additional performance constraint in the manner + of the traffic conditioning elements in a QoS-enabled network. + Traffic conditioners within QoS architectures are typically specified + using a rate enforcement mechanism of token buckets. Token bucket + traffic conditioners behave in a manner that is analogous to a First + In First Out queue. Such traffic conditioning systems impose tail + drop behavior on TCP streams. This tail drop behavior can produce + TCP timeout retransmission, unduly penalizing the average TCP goodput + rate to a level that may be well below the level specified by the + token bucket traffic conditioner. Token buckets can be considered as + TCP-hostile network elements. + + The larger issue exposed in this consideration is that provision of + some form of assured service to congestion-managed traffic flows + requires traffic conditioning elements that operate using weighted + RED-like control behaviors within the network, with less + deterministic traffic patterns as an outcome. A requirement to + manage TCP burst behavior through token bucket control mechanisms is + most appropriately managed in the sender's TCP stack. + + There are a number of open areas in this topic that would benefit + from further research. The nature of the interaction between the + end-to-end TCP control system and a collection of service + differentiation mechanisms with a network is has a large number of + variables. The issues concern the time constants of the control + systems, the amplitude of feedback loops, and the extent to which + each control system assumes an operating model of other active + control systems that are applied to the same traffic flow, and the + mode of convergence to a stable operational state for each control + system. + + + + +Huston Informational [Page 12] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + +3.6 Per-Flow States and Per-Packet classifiers + + Both the IntServ and DiffServ architectures use packet classifiers as + an intrinsic part of their architecture. These classifiers can be + considered as coarse or fine level classifiers. Fine-grained + classifiers can be considered as classifiers that attempt to isolate + elements of traffic from an invocation of an application (a `micro- + flow') and use a number of fields in the IP packet header to assist + in this, typically including the source and destination IP addresses + and source and source and destination port addresses. Coarse-grained + classifiers attempt to isolate traffic that belongs to an aggregated + service state, and typically use the DiffServ code field as the + classifying field. In the case of DiffServ there is the potential to + use fine-grained classifiers as part of the network ingress element, + and coarse-gained classifiers within the interior of the network. + + Within flow-sensitive IntServ deployments, every active network + element that undertakes active service discrimination is requirement + to operate fine-grained packet classifiers. The granularity of the + classifiers can be relaxed with the specification of aggregate + classifiers [5], but at the expense of the precision and accuracy of + the service response. + + Within the IntServ architecture the fine-grained classifiers are + defined to the level of granularity of an individual traffic flow, + using the packet's 5-tuple of (source address, destination address, + source port, destination port, protocol) as the means to identify an + individual traffic flow. The DiffServ Multi-Field (MF) classifiers + are also able to use this 5-tuple to map individual traffic flows + into supported behavior aggregates. + + The use of IPSEC, NAT and various forms of IP tunnels result in a + occlusion of the flow identification within the IP packet header, + combining individual flows into a larger aggregate state that may be + too coarse for the network's service policies. The issue with such + mechanisms is that they may occur within the network path in a + fashion that is not visible to the end application, compromising the + ability for the application to determine whether the requested + service profile is being delivered by the network. In the case of + IPSEC there is a proposal to carry the IPSEC Security Parameter Index + (SPI) in the RSVP object [10], as a surrogate for the port addresses. + In the case of NAT and various forms of IP tunnels, there appears to + be no coherent way to preserve fine-grained classification + characteristics across NAT devices, or across tunnel encapsulation. + + IP packet fragmentation also affects the ability of the network to + identify individual flows, as the trailing fragments of the IP packet + will not include the TCP or UDP port address information. This admits + + + +Huston Informational [Page 13] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + the possibility of trailing fragments of a packet within a + distinguished service class being classified into the base best + effort service category, and delaying the ultimate delivery of the IP + packet to the destination until the trailing best effort delivered + fragments have arrived. + + The observation made here is that QoS services do have a number of + caveats that should be placed on both the application and the + network. Applications should perform path MTU discovery in order to + avoid packet fragmentation. Deployment of various forms of payload + encryption, header address translation and header encapsulation + should be undertaken with due attention to their potential impacts on + service delivery packet classifiers. + +3.7 The Service Set + + The underlying question posed here is how many distinguished service + responses are adequate to provide a functionally adequate range of + service responses? + + The Differentiated Services architecture does not make any limiting + restrictions on the number of potential services that a network + operator can offer. The network operator may be limited to a choice + of up to 64 discrete services in terms of the 6 bit service code + point in the IP header but as the mapping from service to code point + can be defined by each network operator, there can be any number of + potential services. + + As always, there is such a thing as too much of a good thing, and a + large number of potential services leads to a set of issues around + end-to-end service coherency when spanning multiple network domains. + A small set of distinguished services can be supported across a large + set of service providers by equipment vendors and by application + designers alike. An ill-defined large set of potential services + often serves little productive purpose. This does point to a + potential refinement of the QoS architecture to define a small core + set of service profiles as "well-known" service profiles, and place + all other profiles within a "private use" category. + +3.8 Measuring Service Delivery + + There is a strong requirement within any QoS architecture for network + management approaches that provide a coherent view of the operating + state of the network. This differs from a conventional element-by- + element management view of the network in that the desire here is to + be able to provide a view of the available resources along a + + + + + +Huston Informational [Page 14] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + particular path within a network, and map this view to an admission + control function which can determine whether to admit a service + differentiated flow along the nominated network path. + + As well as managing the admission systems through resource + availability measurement, there is a requirement to be able to + measure the operating parameters of the delivered service. Such + measurement methodologies are required in order to answer the + question of how the network operator provides objective measurements + to substantiate the claim that the delivered service quality + conformed to the service specifications. Equally, there is a + requirement for a measurement methodology to allow the client to + measure the delivered service quality so that any additional expense + that may be associated with the use of premium services can be + justified in terms of superior application performance. + + Such measurement methodologies appear to fall within the realm of + additional refinement to the QoS architecture. + +3.9 QoS Accounting + + It is reasonable to anticipate that such forms of premium service and + customized service will attract an increment on the service tariff. + The provision of a distinguished service is undertaken with some + level of additional network resources to support the service, and the + tariff premium should reflect this altered resource allocation. Not + only does such an incremental tariff shift the added cost burden to + those clients who are requesting a disproportionate level of + resources, but it provides a means to control the level of demand for + premium service levels. + + If there are to be incremental tariffs on the use of premium + services, then some accounting of the use of the premium service + would appear to be necessary relating use of the service to a + particular client. So far there is no definition of such an + accounting model nor a definition as to how to gather the data to + support the resource accounting function. + + The impact of this QoS service model may be quite profound to the + models of Internet service provision. The commonly adopted model in + both the public internet and within enterprise networks is that of a + model of access, where the clients service tariff is based on the + characteristics of access to the services, rather than that of the + actual use of the service. The introduction of QoS services creates + a strong impetus to move to usage-based tariffs, where the tariff is + based on the level of use of the network's resources. This, in turn, + generates a requirement to meter resource use, which is a form of + usage accounting. This topic was been previously studied within the + + + +Huston Informational [Page 15] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + IETF under the topic of "Internet Accounting" [11], and further + refinement of the concepts used in this model, as they apply to QoS + accounting may prove to be a productive initial step in formulating a + standards-based model for QoS accounting. + +3.10 QoS Deployment Diversity + + It is extremely improbable that any single form of service + differentiation technology will be rolled out across the Internet and + across all enterprise networks. + + Some networks will deploy some form of service differentiation + technology while others will not. Some of these service platforms + will interoperate seamlessly and other less so. To expect all + applications, host systems, network routers, network policies, and + inter-provider arrangements to coalesce into a single homogeneous + service environment that can support a broad range of service + responses is an somewhat unlikely outcome given the diverse nature of + the available technologies and industry business models. It is more + likely that we will see a number of small scale deployment of service + differentiation mechanisms and some efforts to bridge these + environments together in some way. + + In this heterogeneous service environment the task of service + capability discovery is as critical as being able to invoke service + responses and measure the service outcomes. QoS architectures will + need to include protocol capabilities in supporting service discovery + mechanisms. + + In addition, such a heterogeneous deployment environment will create + further scaling pressure on the operational network as now there is + an additional dimension to the size of the network. Each potential + path to each host is potentially qualified by the service + capabilities of the path. While one path may be considered as a + candidate best effort path, another path may offer a more precise + match between the desired service attributes and the capabilities of + the path to sustain the service. Inter-domain policy also impacts + upon this path choice, where inter-domain transit agreements may + specifically limit the types and total level of quality requests than + may be supported between the domains. Much of the brunt of such + scaling pressures will be seen in the inter-domain and intra-domain + routing domain where there are pressures to increase the number of + attributes of a routing entry, and also to use the routing protocol + in some form of service signaling role. + + + + + + + +Huston Informational [Page 16] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + +3.11 QoS Inter-Domain signaling + + QoS Path selection is both an intra-domain (interior) and an inter- + domain (exterior) issue. Within the inter-domain space, the current + routing technologies allow each domain to connect to a number of + other domains, and to express its policies with respect to received + traffic in terms of inter-domain route object attributes. + Additionally, each domain may express its policies with respect to + sending traffic through the use of boundary route object filters, + allowing a domain to express its preference for selecting one + domain's advertised routes over another. The inter-domain routing + space is a state of dynamic equilibrium between these various route + policies. + + The introduction of differentiated services adds a further dimension + to this policy space. For example, while a providers may execute an + interconnection agreement with one party to exchange best effort + traffic, it may execute another agreement with a second party to + exchange service qualified traffic. The outcome of this form of + interconnection is that the service provider will require external + route advertisements to be qualified by the accepted service + profiles. Generalizing from this scenario, it is reasonable to + suggest that we will require the qualification of routing + advertisements with some form of service quality attributes. This + implies that we will require some form of quality vector-based + forwarding function, at least in the inter-domain space, and some + associated routing protocol can pass a quality of service vector in + an operationally stable fashion. + + The implication of this requirement is that the number of objects + being managed by routing systems must expand dramatically, as the + size and number of objects managed within the routing domain + increases, and the calculation of a dynamic equilibrium of import and + export policies between interconnected providers will also be subject + to the same level of scaling pressure. + + This has implications within the inter-domain forwarding space as + well, as the forwarding decision in such a services differentiated + environment is then qualified by some form of service quality vector. + This is required in order to pass exterior traffic to the appropriate + exterior interconnection gateway. + +3.12 QoS Deployment Logistics + + How does the widespread deployment of service-aware networks + commence? Which gets built first - host applications or network + infrastructure? + + + + +Huston Informational [Page 17] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + No network operator will make the significant investment in + deployment and support of distinguished service infrastructure unless + there is a set of clients and applications available to make + immediate use of such facilities. Clients will not make the + investment in enhanced services unless they see performance gains in + applications that are designed to take advantage of such enhanced + services. No application designer will attempt to integrate service + quality features into the application unless there is a model of + operation supported by widespread deployment that makes the + additional investment in application complexity worthwhile and + clients who are willing to purchase such applications. With all + parts of the deployment scenario waiting for the others to move, + widespread deployment of distinguished services may require some + other external impetus. + + Further aspects of this deployment picture lie in the issues of + network provisioning and the associated task of traffic engineering. + Engineering a network to meet the demands of best effort flows + follows a well understood pattern of matching network points of user + concentrations to content delivery network points with best effort + paths. Integrating QoS-mediated traffic engineering into the + provisioning model suggests a provisioning requirement that also + requires input from a QoS demand model. + +4. The objective of the QoS architecture + + What is the precise nature of the problem that QoS is attempting to + solve? Perhaps this is one of the more fundamental questions + underlying the QoS effort, and the diversity of potential responses + is a pointer to the breadth of scope of the QoS effort. + + All of the following responses form a part of the QoS intention: + + - To control the network service response such that the response + to a specific service element is consistent and predictable. + + - To control the network service response such that a service + element is provided with a level of response equal to or above a + guaranteed minimum. + + - To allow a service element to establish in advance the service + response that can or will be obtained from the network. + + - To control the contention for network resources such that a + service element is provided with a superior level of network + resource. + + + + + +Huston Informational [Page 18] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + - To control the contention for network resources such that a + service element does not obtain an unfair allocation of + resources (to some definition of 'fairness'). + + - To allow for efficient total utilization of network resources + while servicing a spectrum of directed network service outcomes. + + Broadly speaking, the first three responses can be regarded as + 'application-centric', and the latter as 'network-centric'. It is + critical to bear in mind that none of these responses can be + addressed in isolation within any effective QoS architecture. Within + the end-to-end architectural model of the Internet, applications make + minimal demands on the underlying IP network. In the case of TCP, + the protocol uses an end-to-end control signal approach to + dynamically adjust to the prevailing network state. QoS + architectures add a somewhat different constraint, in that the + network is placed in an active role within the task of resource + allocation and service delivery, rather than being a passive object + that requires end systems to adapt. + +5. Towards an end-to-end QoS architecture + + The challenge facing the QoS architecture lies in addressing the + weaknesses noted above, and in integrating the various elements of + the architecture into a cohesive whole that is capable of sustaining + end-to-end service models across a wide diversity of internet + platforms. It should be noted that such an effort may not + necessarily result in a single resultant architecture, and that it is + possible to see a number of end-to-end approaches based on different + combinations of the existing components. + + One approach is to attempt to combine both architectures into an + end-to-end model, using IntServ as the architecture which allows + applications to interact with the network, and DiffServ as the + architecture to manage admission the network's resources [7]. In + this approach, the basic tension that needs to be resolved lies in + difference between the per-application view of the IntServ + architecture and the network boundary-centric view of the DiffServ + architecture. + + One building block for such an end-to-end service architecture is a + service signaling protocol. The RSVP signaling protocol can address + the needs of applications that require a per-service end-to-end + service signaling environment. The abstracted model of RSVP is that + of a discovery signaling protocol that allows an application to use a + single transaction to communicate its service requirements to both + the network and the remote party, and through the response mechanism, + to allow these network elements to commit to the service + + + +Huston Informational [Page 19] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + requirements. The barriers to deployment for this model lie in an + element-by element approach to service commitment, implying that each + network element must undertake some level of signaling and processing + as dictated by this imposed state. For high precision services this + implies per-flow signaling and per-flow processing to support this + service model. This fine-grained high precision approach to service + management is seen as imposing an unacceptable level of overhead on + the central core elements of large carrier networks. + + The DiffServ approach uses a model of abstraction which attempts to + create an external view of a compound network as a single subnetwork. + From this external perspective the network can be perceived as two + boundary service points, ingress and egress. The advantage of this + approach is that there exists the potential to eliminate the + requirement for per-flow state and per-flow processing on the + interior elements of such a network, and instead provide aggregate + service responses. + + One approach is for applications to use RSVP to request that their + flows be admitted into the network. If a request is accepted, it + would imply that there is a committed resource reservation within the + IntServ-capable components of the network, and that the service + requirements have been mapped into a compatible aggregate service + class within the DiffServ-capable network [7]. The DiffServ core + must be capable of carrying the RSVP messages across the DiffServ + network, so that further resource reservation is possible within the + IntServ network upon egress from the DiffServ environment. The + approach calls for the DiffServ network to use per-flow multi-field + (MF) classifier, where the MF classification is based on the RSVP- + signaled flow specification. The service specification of the RSVP- + signaled resource reservation is mapped into a compatible aggregate + DiffServ behavior aggregate and the MF classifier marks packets + according to the selected behavior. Alternatively the boundary of + the IntServ and DiffServ networks can use the IntServ egress to mark + the flow packets with the appropriate DSCP, allowing the DiffServ + ingress element to use the BA classifier, and dispense with the per- + flow MF classifier. + + A high precision end-to-end QoS model requires that any admission + failure within the DiffServ network be communicated to the end + application, presumably via RSVP. This allows the application to + take some form of corrective action, either by modifying it's service + requirements or terminating the application. If the service + agreement between the DiffServ network is statically provisioned, + then this static information can be loaded into the IntServ boundary + systems, and IntServ can manage the allocation of available DiffServ + behavior aggregate resources. If the service agreement is + + + + +Huston Informational [Page 20] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + dynamically variable, some form of signaling is required between the + two networks to pass this resource availability information back into + the RSVP signaling environment. + +6. Conclusions + + None of these observations are intended to be any reason to condemn + the QoS architectures as completely impractical, nor are they + intended to provide any reason to believe that the efforts of + deploying QoS architectures will not come to fruition. + + What this document is intended to illustrate is that there are still + a number of activities that are essential precursors to widespread + deployment and use of such QoS networks, and that there is a need to + fill in the missing sections with something substantial in terms of + adoption of additional refinements to the existing QoS model. + + The architectural direction that appears to offer the most promising + outcome for QoS is not one of universal adoption of a single + architecture, but instead use a tailored approach where aggregated + service elements are used in the core of a network where scalability + is a major design objective and use per-flow service elements at the + edge of the network where accuracy of the service response is a + sustainable outcome. + + Architecturally, this points to no single QoS architecture, but + rather to a set of QoS mechanisms and a number of ways these + mechanisms can be configured to interoperate in a stable and + consistent fashion. + +7. Security Considerations + + The Internet is not an architecture that includes a strict + implementation of fairness of access to the common transmission and + switching resource. The introduction of any form of fairness, and, + in the case of QoS, weighted fairness, implies a requirement for + transparency in the implementation of the fairness contract between + the network provider and the network's users. This requires some + form of resource accounting and auditing, which, in turn, requires + the use of authentication and access control. The balancing factor + is that a shared resource should not overtly expose the level of + resource usage of any one user to any other, so that some level of + secrecy is required in this environment + + The QoS environment also exposes the potential of theft of resources + through the unauthorized admission of traffic with an associated + service profile. QoS signaling protocols which are intended to + + + + +Huston Informational [Page 21] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + undertake resource management and admission control require the use + of identity authentication and integrity protection in order to + mitigate this potential for theft of resources. + + Both forms of QoS architecture require the internal elements of the + network to be able to undertake classification of traffic based on + some form of identification that is carried in the packet header in + the clear. Classifications systems that use multi-field specifiers, + or per-flow specifiers rely on the carriage of end-to-end packet + header fields being carried in the clear. This has conflicting + requirements for security architectures that attempt to mask such + end-to-end identifiers within an encrypted payload. + + QoS architectures can be considered as a means of exerting control + over network resource allocation. In the event of a rapid change in + resource availability (e.g. disaster) it is an undesirable outcome if + the remaining resources are completely allocated to a single class of + service to the exclusion of all other classes. Such an outcome + constitutes a denial of service, where the traffic control system + (routing) selects paths that are incapable of carrying any traffic of + a particular service class. + +8. References + + [1] Bradner, S., "The Internet Standards Process- Revision 3", BCP + 9, RFC 2026, October 1996. + + [2] Mankin, A., Baker, F., Braden, R., O'Dell, M., Romanow, A., + Weinrib, A. and L. Zhang, "Resource ReSerVation Protocol (RSVP) + Version 1 Applicability Statement", RFC 2208, September 1997. + + [3] Braden. R., Clark, D. and S. Shenker, "Integrated Services in + the Internet Architecture: an Overview", RFC 1633, June 1994. + + [4] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W. + Weiss, "An Architecture for Differentiated Services", RFC 2475, + December 1998. + + [5] Baker, F., Iturralde, C., Le Faucher, F., Davie, B., + "Aggregation of RSVP for IPv4 and IPv6 Reservations", Work in + Progress. + + [6] Bernet, Y., "Format of the RSVP DCLASS Object", RFC 2996, + November 2000. + + + + + + + +Huston Informational [Page 22] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + + [7] Bernet, Y., Yavatkar, R., Ford, P., Baker, F., Zhang, L., Speer, + M., Braden, R., Davie, B., Wroclawski, J. and E. Felstaine, "A + Framework for Integrated Services Operation Over DiffServ + Networks", RFC 2998, November 2000. + + [8] "Quality of Service Technical Overview", Microsoft Technical + Library, Microsoft Corporation, September 1999. + + [9] "Resource Reservation Protocol API (RAPI)", Open Group Technical + Standard, C809 ISBN 1-85912-226-4, The Open Group, December + 1998. + + [10] Berger, L. and T. O'Malley, "RSVP Extensions for IPSEC Data + Flows", RFC 2007, September 1997. + + [11] Mills, C., Hirsh, D. and G. Ruth, "Internet Accounting: + Background", RFC 1272, November 1991. + +9. Acknowledgments + + Valuable contributions to this document came from Yoram Bernet, Brian + Carpenter, Jon Crowcroft, Tony Hain and Henning Schulzrinne. + +10. Author's Address + + Geoff Huston + Telstra + 5/490 Northbourne Ave + Dickson ACT 2602 + AUSTRALIA + + EMail: gih@telstra.net + + + + + + + + + + + + + + + + + + + +Huston Informational [Page 23] + +RFC 2990 Next Steps for QoS Architecture November 2000 + + +11. Full Copyright Statement + + Copyright (C) The Internet Society (2000). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Huston Informational [Page 24] + -- cgit v1.2.3