From 4bfd864f10b68b71482b35c818559068ef8d5797 Mon Sep 17 00:00:00 2001 From: Thomas Voss Date: Wed, 27 Nov 2024 20:54:24 +0100 Subject: doc: Add RFC documents --- doc/rfc/rfc7778.txt | 1403 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 1403 insertions(+) create mode 100644 doc/rfc/rfc7778.txt (limited to 'doc/rfc/rfc7778.txt') diff --git a/doc/rfc/rfc7778.txt b/doc/rfc/rfc7778.txt new file mode 100644 index 0000000..ae13815 --- /dev/null +++ b/doc/rfc/rfc7778.txt @@ -0,0 +1,1403 @@ + + + + + + +Internet Engineering Task Force (IETF) D. Kutscher +Request for Comments: 7778 F. Mir +Category: Informational R. Winter +ISSN: 2070-1721 NEC + S. Krishnan + Ericsson + Y. Zhang + Hewlett Packard Labs + CJ. Bernardos + UC3M + March 2016 + + + Mobile Communication Congestion Exposure Scenario + +Abstract + + This memo describes a mobile communications use case for congestion + exposure (ConEx) with a particular focus on those mobile + communication networks that are architecturally similar to the 3GPP + Evolved Packet System (EPS). This memo provides a brief overview of + the architecture of these networks (both access and core networks) + and current QoS mechanisms and then discusses how congestion exposure + concepts could be applied. Based on this discussion, this memo + suggests a set of requirements for ConEx mechanisms that particularly + apply to these mobile networks. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc7778. + + + + + + + + + +Kutscher, et al. Informational [Page 1] + +RFC 7778 ConEx Mobile Scenario March 2016 + + +Copyright Notice + + Copyright (c) 2016 IETF Trust and the persons identified as the + document authors. All rights reserved. This document is subject to + BCP 78 and the IETF Trust's Legal Provisions Relating to IETF + Documents (http://trustee.ietf.org/license-info) in effect on the + date of publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.1. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . 4 + 2. ConEx Use Cases in Mobile Communication Networks . . . . . . 4 + 2.1. ConEx as a Basis for Traffic Management . . . . . . . . . 5 + 2.2. ConEx to Incentivize Scavenger Transports . . . . . . . . 7 + 2.3. Accounting for Congestion Volume . . . . . . . . . . . . 7 + 2.4. Partial vs. Full Deployment . . . . . . . . . . . . . . . 8 + 2.5. Summary . . . . . . . . . . . . . . . . . . . . . . . . . 9 + 3. ConEx in the EPS . . . . . . . . . . . . . . . . . . . . . . 9 + 3.1. Possible Deployment Scenarios . . . . . . . . . . . . . . 9 + 3.2. Implementing ConEx Functions in the EPS . . . . . . . . . 14 + 3.2.1. ConEx Protocol Mechanisms . . . . . . . . . . . . . . 15 + 3.2.2. ConEx Functions in the Mobile Network . . . . . . . . 15 + 4. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 + 5. Security Considerations . . . . . . . . . . . . . . . . . . . 19 + 6. Informative References . . . . . . . . . . . . . . . . . . . 19 + Appendix A. Overview of 3GPP's EPS . . . . . . . . . . . . . . . 22 + Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 24 + Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24 + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 2] + +RFC 7778 ConEx Mobile Scenario March 2016 + + +1. Introduction + + Mobile data traffic continues to grow rapidly. The challenge + wireless operators face is to support more subscribers with an + increasing bandwidth demand. To meet these bandwidth requirements, + there is a need for new technologies that assist the operators in + efficiently utilizing the available network resources. Two specific + areas where such new technologies could be deemed useful are resource + allocation and flow management. + + Analysis of data traffic in cellular networks has shown that most + flows are short lived and low volume, but a comparatively small + number of high-volume flows constitute a large fraction of the + overall traffic volume [lte-sigcomm2013]. That means that + potentially a small fraction of users is responsible for the majority + of traffic in cellular networks. In view of such highly skewed user + behavior and limited and expensive resources (e.g., the wireless + spectrum), resource allocation and usage accountability are two + important issues for operators to solve in order to achieve both a + better network resource utilization and fair resource sharing. + ConEx, as described in [RFC6789], is a technology that can be used to + achieve these goals. + + The ConEx mechanism is designed to be a general technology that could + be applied as a key element of congestion management solutions for a + variety of use cases. In particular, use cases that are of interest + for initial deployment are those in which the end hosts and the + network that contains the destination end hosts are ConEx-enabled but + other networks need not be. + + A specific example of such a use case can be a mobile communication + network such as a 3GPP EPS networks where UEs (User Equipment) (i.e., + mobile end hosts), servers and caches, the access network, and + possibly an operator's core network can be ConEx-enabled; that is, + hosts support the ConEx mechanisms, and the network provides + policing/auditing functions at its edges. + + This document provides a brief overview of the architecture of such + networks (access and core networks) and current QoS mechanisms. It + further discusses how such networks can benefit from congestion + exposure concepts and how they should be applied. Using this use + case as a basis, a set of requirements for ConEx mechanisms are + described. + + + + + + + + +Kutscher, et al. Informational [Page 3] + +RFC 7778 ConEx Mobile Scenario March 2016 + + +1.1. Acronyms + + In this section, we expand some acronyms that are used throughout the + text. Most are explained and put in a system context in Appendix A + and the 3GPP, ECN, and ConEx specifications referenced there. + + eNB + Evolved NodeB: LTE base station + + HSS + Home Subscriber Server + + S-GW + Serving Gateway: mobility anchor and tunnel endpoint + + P-GW + Packet Data Network (PDN) Gateway: tunnel endpoint for user-plane + and control-plane protocols -- typically the GW to the Internet or + an operator's service network + + UE + User Equipment: mobile terminals + + GTP + GPRS Tunneling Protocol [TS29060] + + GTP-U + GTP User Data Tunneling [TS29060] + + GTP-C + GTP Control [TS29060] + +2. ConEx Use Cases in Mobile Communication Networks + + In general, quality of service and good network resource utilization + are important requirements for mobile communication network + operators. Radio access and backhaul capacity are considered scarce + resources, and bandwidth (and radio resource) demand is difficult to + predict precisely due to user mobility, radio propagation effects, + etc. Hence, today's architectures and protocols go to significant + lengths in order to provide network-controlled quality of service. + These efforts often lead to complexity and cost. ConEx could be a + simpler and more capable approach to efficient resource sharing in + these networks. + + + + + + + +Kutscher, et al. Informational [Page 4] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + In the following sections, we discuss ways that congestion exposure + could be beneficial for supporting resource management in such mobile + communication networks. [RFC6789] describes fundamental congestion + exposure concepts and a set of use cases for applying congestion + exposure mechanisms to realize different traffic management functions + such as flow policy-based traffic management or traffic offloading. + Readers that are not familiar with the 3GPP EPS should refer to + Appendix A first. + +2.1. ConEx as a Basis for Traffic Management + + Traffic management is a very important function in mobile + communication networks. Since wireless resources are considered + scarce and since user mobility and shared bandwidth in the wireless + access create certain dynamics with respect to available bandwidth, + commercially operated mobile networks provide mechanisms for tight + resource management (admission control for bearer establishment). + However, sometimes these mechanisms are not easily applicable to IP- + and HTTP-dominated traffic mixes; for example, most Internet traffic + in today's mobile network is transmitted over the (best-effort) + default bearer. + + Given the above, and in the light of the significant increase of + overall data volume in 3G networks, Deep Packet Inspection (DPI) is + often considered a desirable function to have in the Evolved Packet + Core (EPC) -- despite its cost and complexity. However, with the + increase of encrypted data traffic, traffic management using DPI + alone will become even more challenging. + + Congestion exposure can be employed to address resource management + requirements in different ways: + + 1. It can enable or enhance flow policy-based traffic management. + At present, DPI-based resource management is often used to + prioritize certain application classes with respect to others in + overload situations, so that more users can be served effectively + on the network. In overload situations, operators use DPI to + identify dispensable flows and make them yield to other flows (of + different application classes) through policing. Such traffic + management is thus based on operator decisions, using partly + static configuration and some estimation about the future per- + flow bandwidth demand. With congestion exposure, it would be + possible to assess the contribution to congestion of individual + flows. This information can then be used as input to a policer + that can optimize network utilization more accurately and + dynamically. By using ConEx congestion contribution as a metric, + such policers would not need to be aware of specific link loads + (e.g., in wireless base stations) or flow application types. + + + +Kutscher, et al. Informational [Page 5] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + 2. It can reduce the need for complex DPI by allowing for a bulk + packet traffic management system that does not have to consider + either the application classes flows belong to or the individual + sessions. Instead, traffic management would be based on the + current cost (contribution to congestion) incurred by different + flows and enable operators to apply policing/accounting depending + on their preference. Such traffic management would be simpler + and more robust (no real-time flow application type + identification required, no static configuration of application + classes); it would also perform better as decisions can be made + based on real-time actual cost contribution. With ConEx, + accurate downstream path information would be visible to ingress + network operators, which can respond to incipient congestion in + time. This can be equivalent to offering different levels of + QoS, e.g., premium service with zero congestion response. For + that, ConEx could be used in two different ways: + + A. as additional information to assist network functions to + impose different QoS for different application sessions; and + + B. as a tool to let applications decide on their response to + congestion notification while incentivizing them to react (in + general) appropriately, e.g., by enforcing overall limits for + congestion contribution or by accounting and charging for + such congestion contribution. Note that this level of + responsiveness would be on a different level than, say, + application-layer responsiveness in protocols such as Dynamic + Adaptive Streaming over HTTP (DASH) [dash]; however, it could + interwork with such protocols, for example, by triggering + earlier responses. + + 3. It can further be used to more effectively trigger the offload of + selected traffic to a non-3GPP network. Nowadays, it is common + that users are equipped with dual-mode mobile phones (e.g., + integrating third/fourth generation cellular and Wi-Fi radio + devices) capable of attaching to available networks either + sequentially or simultaneously. With this scenario in mind, 3GPP + is currently looking at mechanisms to seamlessly and selectively + switch over a single IP flow (e.g., user application) to a + different radio access while keeping all other ongoing + connections untouched. The decision on when and which IP flows + move is typically based on statically configured rules, whereas + the use of ConEx mechanisms could also factor real-time + congestion information into the decision. + + In summary, it can be said that traffic management in the 3GPP EPS + and other mobile communication architectures is very important. + Currently, more static approaches based on admission control and + + + +Kutscher, et al. Informational [Page 6] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + static QoS are in use, but recently, there has been a perceived need + for more dynamic mechanisms based on DPI. Introducing ConEx could + make these mechanisms more efficient or even remove the need for some + of the DPI functions deployed today. + +2.2. ConEx to Incentivize Scavenger Transports + + 3G and LTE networks are turning into universal access networks that + are shared between mobile (smart) phone users, mobile users with + laptop PCs, home users with LTE access, and others. Capacity sharing + among different users and application flows becomes increasingly + important in these mobile communication networks. + + Most of this traffic is likely to be classified as best-effort + traffic without differentiating, for example, periodic OS updates and + application store downloads from web-based (i.e., browser-based) + communication or other real-time communication. For many of the bulk + data transfers, completion times are not important within certain + bounds; therefore, if scavenger transports (or transports that are + less than best effort) such as Low Extra Delay Background Transport + (LEDBAT) [RFC6817] were used, it would improve the overall utility of + the network. The use of these transports by the end user, however, + needs to be incentivized. ConEx could be used to build an incentive + scheme, e.g., by giving a larger bandwidth allowance to users that + contribute less to congestion or lowering the next monthly + subscription fee. In principle, this would be possible to implement + with current specifications. + +2.3. Accounting for Congestion Volume + + 3G and LTE networks provide extensive support for accounting and + charging already, for example, see the Policy Charging Control (PCC) + architecture [TS23203]. In fact, most operators today account + transmitted data volume on a very fine granular basis and either + correlate monthly charging to the exact number of packets/bytes + transmitted or employ some form of flat rate (or flexible flat rate), + often with a so-called fair-use policy. With such policies, users + are typically limited to an administratively configured maximum + bandwidth limit after they have used up their contractual data volume + budget for the charging period. + + Changing this data from volume-based accounting to congestion-based + accounting would be possible in principle, especially since there + already is an elaborate per-user accounting system available. Also, + an operator-provided mobile communication network can be seen as a + network domain that would allow for such congestion volume + accounting. This would not require any support from the global + Internet, especially since the typical scarce resources such as the + + + +Kutscher, et al. Informational [Page 7] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + wireless access and the mobile backhaul are all within this domain. + Traffic normally leaves/enters the operator's network via well- + defined egress/ingress points that would be ideal candidates for + policing functions. Moreover, in most commercially operated + networks, accounting is performed for both received and sent data, + which would facilitate congestion volume accounting as well. + + With respect to the current Path Computation Client (PCC) framework, + accounting for congestion volume could be added as another feature to + the "Usage Monitoring Control" capability that is currently based on + data volume. This would not require a new interface (reference + points) at all. + +2.4. Partial vs. Full Deployment + + In general, ConEx lends itself to partial deployment as the mechanism + does not require all routers and hosts to support congestion + exposure. Moreover, assuming a policing infrastructure has been put + in place, it is not required to modify all hosts. Since ConEx is + about senders exposing congestion contribution to the network, + senders need to be made ConEx-aware (assuming a congestion + notification mechanism such as Explicit Congestion Notification (ECN) + is in place). + + When moving towards full deployment in a specific operator's network, + different ways for introducing ConEx support on UEs are feasible. + Since mobile communication networks are multi-vendor networks, + standardizing ConEx support on UEs (e.g., in 3GPP specifications) + appears useful. Still, not all UEs would have to support ConEx, and + operators would be free to choose their policing approach in such + deployment scenarios. Leveraging existing PCC architectures, 3GPP + network operators could, for example, decide policing/accounting + approaches per UE -- i.e., apply fixed volume caps for non-ConEx UEs + and more flexible schemes for ConEx-enabled UEs. + + Moreover, it should be noted that network support for ConEx is a + feature that some operators may choose to deploy if they wish, but it + is not required that all operators (or all other networks) do so. + + Depending on the extent of ConEx support, specific aspects such as + roaming have to be taken into account, i.e., what happens when a user + is roaming in a ConEx-enabled network but their UE is not ConEx- + enabled and vice versa. Although these may not be fundamental + problems, they need to be considered. For supporting mobility in + general, it can be required to shift users' policing state during a + handover. There is existing work on distributed rate limiting (see + [raghavan2007]) and on specific optimizations (see [nec.euronf-2011]) + for congestion exposure and policing in mobility scenarios. + + + +Kutscher, et al. Informational [Page 8] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + Another aspect to consider is the addition of Selected IP Traffic + Offload (SIPTO) and Local IP Access (LIPA) [TR23829]), i.e., the idea + that some traffic such as high-volume Internet traffic is actually + not passed through the EPC but is offloaded at a "break-out point" + closer to (or in) the access network. On the other hand, ConEx can + also enable more dynamic decisions on what traffic to actually + offload by considering congestion exposure in bulk traffic + aggregates, thus making traffic offload more effective. + +2.5. Summary + + In summary, the 3GPP EPS is a system architecture that can benefit + from congestion exposure in multiple ways. Dynamic traffic and + congestion management is an acknowledged and important requirement + for the EPS; this is also illustrated by the current DPI-related work + for EPS. + + Moreover, networks such as an EPS mobile communication network would + be quite amenable for deploying ConEx as a mechanism, since they + represent clearly defined and well-separated operational domains in + which local ConEx deployment would be possible. Aside from roaming + (which needs to be considered for a specific solution), such a + deployment is fully under the control of a single operator, which can + enable operator-local enhancement without the need for major changes + to the architecture. + + In 3GPP EPS, interfaces between all elements of the architecture are + subject to standardization, including UE interfaces and eNB + interfaces, so that a more general approach, involving more than a + single operator's network, can be feasible as well. + +3. ConEx in the EPS + + In this section, we discuss a few options for how such a mechanism + (and possibly additional policing functions) could eventually be + deployed in the 3GPP EPS. Note that this description of options is + not intended to be a complete set of possible approaches; it merely + discusses the most promising options. + +3.1. Possible Deployment Scenarios + + There are different possible ways for how ConEx functions on hosts + and network elements can be used. For example, ConEx could be used + for a limited part of the network only (e.g., for the access + network), congestion exposure and sender adaptation could involve the + mobile nodes or not, or, finally, the ConEx feedback loop could + extend beyond a single operator's domain or not. + + + + +Kutscher, et al. Informational [Page 9] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + We present four different deployment scenarios for congestion + exposure in the figures below: + + 1. In Figure 1, ConEx is supported by servers for sending data (web + servers in the Internet and caches in an operator's network) but + not by UEs (neither for receiving nor sending). An operator who + chooses to run a policing function on the network ingress, e.g., + on the P-GW, can still benefit from congestion exposure without + requiring any change on UEs. + + 2. ConEx is universally employed between operators (as depicted in + Figure 2) with an end-to-end ConEx feedback loop. Here, + operators could still employ local policies, congestion + accounting schemes, etc., and they could use information about + congestion contribution for determining interconnection + agreements. This deployment scenario would imply the willingness + of operators to expose congestion to each other. + + 3. For Isolated ConEx domains as depicted in Figure 3, ConEx is + solely applied locally in the operator network, and there is no + end-to-end congestion exposure. This could be the case when + ConEx is only implemented in a few networks or when operators + decide to not expose ECN and account for congestion for inter- + domain traffic. Independent of the actual scenario, it is likely + that there will be border gateways (as in today's deployments) + that are associated with policing and accounting functions. + + 4. [conex-lite] describes an approach called "ConEx Lite" for mobile + networks that is intended for initial deployment of congestion + exposure concepts in LTE, specifically in the backhaul and core + network segments. As depicted in Figure 4, ConEx Lite allows a + tunnel receiver to monitor the volume of bytes that has been + lost, dropped, or ECN-CE (Congestion Experienced) marked between + the tunnel sender and receiver. For that purpose, a new field + called the Byte Sequence Marker (BSN) is introduced to the tunnel + header to identify the byte in the flow of data from the tunnel + sender to the tunnel receiver. A policer at the tunnel sender is + expected to react according to the tunnel congestion volume (see + [conex-lite] for details). + + + + + + + + + + + + +Kutscher, et al. Informational [Page 10] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + +------------+ + | Web server | + | w/ ConEx | + +------------+ + | + | + | + ----------------------- + | | | + | Internet | | + | | | + ----------------------- + | + --------------------------------------------|-------- + | | | + | +-----------+ | + | | Web cache | | + | | w/ ConEx | | + | +-----------+ | + | | | + | +----+ +-------+ +-------+ +-------+ | + | | UE |=====| eNB |=====| S-GW |=====| P-GW | | + | +----+ +-------+ +-------+ +-------+ | + | | + | Operator A | + ----------------------------------------------------- + + Figure 1: ConEx Support on Servers and Caches + + + + + + + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 11] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + ----------------------------------------------------- + | +----+ +-------+ +-------+ +-------+ | + | | UE |=====| eNB |=====| S-GW |=====| P-GW | | + | +----+ +-------+ +-------+ +-------+ | + | | | + | Operator A | | + --------------------------------------------|-------- + | + ----------------------- + | | + | Internet | + | | + ----------------------- + | + --------------------------------------------|-------- + | +----+ +-------+ +-------+ +-------+ | + | | UE |=====| eNB |=====| S-GW |=====| P-GW | | + | +----+ +-------+ +-------+ +-------+ | + | | + | Operator B | + ----------------------------------------------------- + + Figure 2: ConEx Deployment across Operator Domains + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 12] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + ----------------------------------------------------- + | |--- ConEx path ---| | + | v v | + | +----+ +-------+ +-------+ +-------+ | + | | UE |=====| eNB |=====| S-GW |=====| P-GW | | + | +----+ +-------+ +-------+ +-------+ | + | | | + | Operator A | | + --------------------------------------------|-------- + | + ----------------------- + | | + | Internet | + | | + ----------------------- + | + --------------------------------------------|-------- + | +----+ +-------+ +-------+ +-------+ | + | | UE |=====| eNB |=====| S-GW |=====| P-GW | | + | +----+ +-------+ +-------+ +-------+ | + | | + | Operator B | + ----------------------------------------------------- + + Figure 3: ConEx Deployment in a Single Operator Domain + + + + + + + + + + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 13] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + Backhaul Network Core Network + +---------------+ +--------------+ + | | | | + | BSN or ECN-CE | | | + | marked | | | + | packets | | | + | <--- | | | + +----+ +-------+ +----------+ +-------+ +--------+ + | | | | GTP-U | | GTP-U | | | | + | UE |=====| eNB |=======| S-GW |=======| P-GW |==|Internet| + | | | | Tunnel| | Tunnel| | | | + +----+ +-------+ +----------+ +-------+ +--------+ + | ---> | | | + | User/control | | User/control | + | packets with | | packet with | + | DL congestion | | DL congestion| + | vol counters | | vol counters | + | | | | + +---------------+ +--------------+ + + Figure 4: ConEx Lite Deployment + + Note: DL stands for "downlink". + +3.2. Implementing ConEx Functions in the EPS + + We expect a ConEx solution to consist of different functions that + should be considered when implementing congestion exposure in the + 3GPP EPS. [RFC7713] describes the following congestion exposure + components: + + o Modified senders that send congestion exposure information in + response to congestion feedback. + + o Receivers that generate congestion feedback (leveraging existing + behavior or requiring new functions). + + o Audit functions that audit ConEx signals against actual + congestion, e.g., by monitoring flows or aggregate of flows. + + o Policy devices that monitor congestion exposure information and + act on the flows according to the operator's policy. + + Two aspects are important to consider: 1) how the ConEx protocol + mechanisms would be implemented and what modifications to existing + networks would be required, and 2) where ConEx functional entities + would be placed best (to allow for a non-invasive addition). We + discuss these two aspects in the following sections. + + + +Kutscher, et al. Informational [Page 14] + +RFC 7778 ConEx Mobile Scenario March 2016 + + +3.2.1. ConEx Protocol Mechanisms + + The most important step in introducing ConEx (initially) is adding + the congestion exposure functionality to senders. For an initial + deployment, no further modification to senders and receivers would be + required. Specifically, there is no fundamental dependency on ECN, + i.e., ConEx can be introduced without requiring ECN to be + implemented. + + Congestion exposure information for IPv6 [CONEX-DESTOPT] is contained + in a destination option header field, which requires minimal changes + at senders and nodes that want to assess path congestion. The + destination option header field does not affect non-ConEx nodes in a + network. + + In 3GPP networks, IP tunneling is used intensively, i.e., using + either IP-in-GTP-U or Proxy Mobile IPv6 (PMIPv6) (i.e., IP-in-IP) + tunnels. In general, the ConEx destination option of encapsulated + packets should be made available for network nodes on the tunnel + path, i.e., a tunnel ingress should copy the ConEx destination option + field to the outer header. + + For effective and efficient capacity sharing, we envisage the + deployment of ECN in conjunction with ConEx so that ECN-enabled + receivers and senders get more accurate and more timely information + about the congestion contribution of their flows. ECN is already + partially introduced into 3GPP networks: Section 11.6 in [TS36300] + specifies the usage of ECN for congestion notification on the radio + link (between eNB and UE), and [TS26114] specifies how this can be + leveraged for voice codec adaptation. A complete, end-to-end support + of ECN would require specification of tunneling behaviour, which + should be based on [RFC6040] (for IP-in-IP tunnels). Specifically, a + specification for tunneling ECN in GTP-U will be needed. + +3.2.2. ConEx Functions in the Mobile Network + + In this section, we discuss some possible placement strategies for + ConEx functional entities (addressing both policing and auditing + functions) in the EPS and for possible optimizations for both the + uplink and the downlink. + + In general, ConEx information (exposed congestion) is declared by a + sender and remains unchanged on the path; hence, reading ConEx + information (e.g., by policing functions) is placement-agnostic. + Auditing ConEx normally requires assessing declared congestion + contribution and current actual congestion. If the latter is, for + example, done using ECN, such a function would best be placed at the + end of the path. + + + +Kutscher, et al. Informational [Page 15] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + In order to provide a comprehensive ConEx-based capacity management + framework for the EPS, it would be advantageous to consider user + contribution to congestion for both the radio access and the core + network. For a non-invasive introduction of ConEx, it can be + beneficial to combine ConEx functions with existing logical EPS + entities. For example, potential places for ConEx policing and + auditing functions would then be eNBs, S-GWs, or the P-GWs. Operator + deployments may, of course, still provide additional intermediary + ConEx-enabled IP network elements. + + For a more specific discussion, it will be beneficial to distinguish + downlink and uplink traffic directions (also see [nec.globecom2010] + for a more detailed discussion). In today's networks and usage + models, downlink traffic is dominating (also reflected by the + asymmetric capacity provided by the LTE radio interface). That does + not, however, imply that uplink congestion is not an issue, since the + asymmetric maximum bandwidth configuration can create a smaller + bottleneck for uplink traffic. There are, of course, backhaul links, + gateways, etc., that could be overloaded as well. + + For managing downlink traffic (e.g., in scenarios such as the one + depicted in Figure 1), operators can have different requirements for + policing traffic. Although policing is, in principle, location- + agnostic, it is important to consider requirements related to the EPS + architecture (Figure 5) such as tunneling between P-GWs and eNBs. + Policing can require access to subscriber information (e.g., + congestion contribution quota) or user-specific accounting, which + suggests that the ConEx function could be co-located with the P-GW + that already has an interface towards the Policy and Charging Rule + Function (PCRF). + + Still, policing can serve different purposes. For example, if the + objective is to police bulk traffic induced by peer networks, + additional monitoring functions can be placed directly at + corresponding ingress points to monitor traffic and possibly drive + out-of-band functions such as triggering border contract penalties. + + The auditing function, which should be placed at the end of the path + (at least after/at the last bottleneck), would likely be placed best + on the eNB (wireless base station). + + For the uplink direction, there are naturally different options for + designing monitoring and policy enforcement functions. A likely + approach can be to monitor congestion exposure on central gateway + nodes (such as P-GWs) that provide the required interfaces to the + PCRF but to perform policing actions in the access network (i.e., in + eNBs). For example, the traffic is policed at the ingress before it + reaches concentration points in the core network. + + + +Kutscher, et al. Informational [Page 16] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + Such a setup would enable all the ConEx use cases described in + Section 2 without requiring significant changes to the EPS + architecture. It would also enable operators to re-use existing + infrastructure, specifically wireless base stations, PCRF, and Home + Subscriber Server (HSS) systems. + + For ConEx functions on elements such as the S-GWs and P-GWs, it is + important to consider mobility and tunneling protocol requirements. + LTE provides two alternative approaches: PMIPv6 [TS23402] and the + GPRS Tunneling Protocol (GTP). For the propagation of congestion + information (responses), tunneling considerations are therefore very + important. + + In general, policing will be done based on per-user (per-subscriber) + information such as congestion quota, current quota usage, etc., and + network operator policies, e.g., specifying how to react to + persistent congestion contribution. In the EPS, per-user information + is normally part of the user profile (stored in the HSS) that would + be accessed by PCC entities such as the PCRF for dynamic updates, + enforcement, etc. + +4. Summary + + We have shown how congestion exposure can be useful for efficient + resource management in mobile communication networks. The premise + for this discussion was the observation that data communication, + specifically best-effort bulk data transmission, is becoming a + commodity service, whereas resources are obviously still limited. + This calls for efficient, scalable, and yet effective capacity + sharing in such networks. + + ConEx can be a mechanism that enables such capacity sharing while + allowing operators to apply these mechanisms in different ways, e.g., + for implementing different use cases as described in Section 2. It + is important to note that ConEx is fundamentally a mechanism that can + be applied in different ways to realize the policies of different + operators. + + ConEx may also be used to complement 3GPP-based mechanisms for + congestion management that are currently under development, such as + in the User Plane Congestion Management (UPCON) work item described + in [TR23705]. + + We have described a few possibilities for adding ConEx as a mechanism + to 3GPP LTE-based networks and have shown how this could be done + incrementally (starting with partial deployment). It is quite + feasible that such partial deployments be done on a per-operator- + domain basis without requiring changes to standard 3GPP interfaces. + + + +Kutscher, et al. Informational [Page 17] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + For network-wide deployment, e.g., with congestion exposure between + operators, more considerations might be needed. + + We have also identified a few implications/requirements that should + be taken into consideration when enabling congestion exposure in such + networks: + + Performance: In mobile communication networks with more expensive + resources and more stringent QoS requirements, the feasibility of + applying ConEx as well as its performance and deployment scenarios + need to be examined closer. For instance, a mobile communication + network may encounter longer delay and higher loss rates, which + can impose specific requirements on the timeliness and accuracy of + congestion exposure information. + + Mobility: One of the unique characteristics of cellular networks + when compared to wired networks is the presence of user mobility. + As the user location changes, the same device can be connected to + the network via different base stations (eNBs) or even go through + switching gateways. Thus, the ConEx scheme must to be able to + carry the latest congestion information per user/flow across + multiple network nodes in real time. + + Multi-access: In cellular networks, multiple access technologies can + co-exist. In such cases, a user can use multiple access + technologies for multiple applications or even a single + application simultaneously. If the congestion policies are set + based on each user, then ConEx should have the capability to + enable information exchange across multiple access domains. + + Tunneling: Both 3G and LTE networks make extensive usage of + tunneling. The ConEx mechanism should be designed in a way to + support usage with different tunneling protocols such as PMIPv6 + and GTP. For ECN-based congestion notification, [RFC6040] + specifies how the ECN field of the IP header should be constructed + on entry and exit from IP-in-IP tunnels. + + Roaming: Independent of the specific architecture, mobile + communication networks typically differentiate between non-roaming + and roaming scenarios. Roaming scenarios are typically more + demanding regarding implementing operator policies, charging, etc. + It can be expected that this would also hold for deploying ConEx. + A more detailed analysis of this problem will be provided in a + future revision of this document. + + It is important to note that ConEx is intended to be used as a + supplement and not a replacement to the existing QoS mechanisms in + mobile networks. For example, ConEx deployed in 3GPP mobile networks + + + +Kutscher, et al. Informational [Page 18] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + can provide useful input to the existing 3GPP PCC mechanisms by + supplying more dynamic network information to supplement the fairly + static information used by the PCC. This would enable the mobile + network to make better policy control decisions than is possible with + only static information. + +5. Security Considerations + + For any ConEx deployment, it is important to apply appropriate + mechanisms to preclude applications and senders from misstating their + congestion contribution. [RFC7713] discusses this problem in detail + and introduces the ConEx auditing concept. ConEx auditing can be + performed in different ways -- for example, flows can be constantly + audited or only audited on demand when network operators decide to do + so. Also, coarse-grained auditing may operate on flow aggregates for + efficiency reasons, whereas fine-grained auditing would inspect + individual flows. In mobile networks, there may be deployment + strategies that favor efficiency over very exact auditing. It is + important to understand the trade-offs and to apply ConEx auditing + appropriately. + + The ConEx protocol specifications [CONEX-DESTOPT] and [TCP-MOD] + discuss additional security considerations that would also apply to + mobile network deployments. + +6. Informative References + + [CONEX-DESTOPT] + Krishnan, S., Kuehlewind, M., Briscoe, B., and C. Ralli, + "IPv6 Destination Option for Congestion Exposure (ConEx)", + Work in Progress, draft-ietf-conex-destopt-12, January + 2016. + + [conex-lite] + Baillargeon, S. and I. Johansson, "ConEx Lite for Mobile + Networks", In Proceedings of the 2014 ACM SIGCOMM Capacity + Sharing Workshop, DOI 10.1145/2630088.2630091, August + 2014. + + [dash] ISO/IEC, "Information Technology -- Dynamic Adaptive + Streaming over HTTP (DASH) -- Part 1: Media presentation + description and segment formats", ISO/IEC 23009-1:2014, + May 2014. + + + + + + + + +Kutscher, et al. Informational [Page 19] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + [lte-sigcomm2013] + Huang, J., Qian, F., Guo, Y., Zhou, Y., Xu, Q., Mao, Z., + Sen, S., and O. Spatscheck, "An In-depth Study of LTE: + Effect of Network Protocol and Application Behavior on + Performance", In Proceedings of the 2013 ACM SIGCOMM + Conference, DOI 10.1145/2486001.2486006, August 2013. + + [nec.euronf-2011] + Mir, F., Kutscher, D., and M. Brunner, "Congestion + Exposure in Mobility Scenarios", In Proceedings of the 7th + Euro-NF Conference on Next Generation Internet (NGI), + DOI 10.1109/NGI.2011.5985948, June 2011. + + [nec.globecom2010] + Kutscher, D., Lundqvist, H., and F. Mir, "Congestion + Exposure in Mobile Wireless Communications", In + Proceedings of 2010 IEEE Global Telecommunications + Conference (GLOBECOM), DOI 10.1109/GLOCOM.2010.5684362, + December 2010. + + [raghavan2007] + Raghavan, B., Vishwanath, K., Ramabhadran, S., Yocum, K., + and A. Snoeren, "Cloud Control with Distributed Rate + Limiting", ACM SIGCOMM Computer Communication Review, + DOI 10.1145/1282427.1282419, October 2007. + + [RFC6040] Briscoe, B., "Tunnelling of Explicit Congestion + Notification", RFC 6040, DOI 10.17487/RFC6040, November + 2010, . + + [RFC6789] Briscoe, B., Ed., Woundy, R., Ed., and A. Cooper, Ed., + "Congestion Exposure (ConEx) Concepts and Use Cases", + RFC 6789, DOI 10.17487/RFC6789, December 2012, + . + + [RFC6817] Shalunov, S., Hazel, G., Iyengar, J., and M. Kuehlewind, + "Low Extra Delay Background Transport (LEDBAT)", RFC 6817, + DOI 10.17487/RFC6817, December 2012, + . + + [RFC7713] Mathis, M. and B. Briscoe, "Congestion Exposure (ConEx) + Concepts, Abstract Mechanism, and Requirements", RFC 7713, + DOI 10.17487/RFC7713, December 2015, + . + + [TCP-MOD] Kuehlewind, M. and R. Scheffenegger, "TCP modifications + for Congestion Exposure", Work in Progress, draft-ietf- + conex-tcp-modifications-10, October 2015. + + + +Kutscher, et al. Informational [Page 20] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + [TR23705] 3GPP, "System Enhancements for User Plane Congestion + Management", 3GPP TR 23.705 13.0.0, December 2015. + + [TR23829] 3GPP, "Local IP Access and Selected IP Traffic Offload + (LIPA-SIPTO)", 3GPP TR 23.829 10.0.1, October 2011. + + [TS23203] 3GPP, "Policy and charging control architecture", 3GPP + TS 23.203 13.6.0, December 2015. + + [TS23401] 3GPP, "General Packet Radio Service (GPRS) enhancements + for Evolved Universal Terrestrial Radio Access Network + (E-UTRAN) access", 3GPP TS 23.401 13.5.0, December 2015. + + [TS23402] 3GPP, "Architecture enhancements for non-3GPP accesses", + 3GPP TS 23.402 13.4.0, December 2015. + + [TS26114] 3GPP, "IP Multimedia Subsystem (IMS); Multimedia + telephony; Media handling and interaction", 3GPP TS 26.114 + 13.2.0, December 2015. + + [TS29060] 3GPP, "General Packet Radio Service (GPRS); GPRS + Tunnelling Protocol (GTP) across the Gn and Gp interface", + 3GPP TS 29.060 13.3.0, December 2015. + + [TS29274] 3GPP, "3GPP Evolved Packet System (EPS); Evolved General + Packet Radio Service (GPRS) Tunnelling Protocol for + Control plane (GTPv2-C); Stage 3", 3GPP TS 29.274 13.4.0, + December 2015. + + [TS36300] 3GPP, "Evolved Universal Terrestrial Radio Access (E-UTRA) + and Evolved Universal Terrestrial Radio Access Network + (E-UTRAN); Overall description; Stage 2", 3GPP TS 36.300 + 13.2.0, January 2016. + + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 21] + +RFC 7778 ConEx Mobile Scenario March 2016 + + +Appendix A. Overview of 3GPP's EPS + + This section provides an overview of the 3GPP "Evolved Packet System" + (EPS [TS36300] [TS23401]) as a specific example of a mobile + communication architecture. Of course, other architectures exist, + but the EPS is used as one example to demonstrate the applicability + of congestion exposure concepts and mechanisms. + + The EPS architecture and some of its standardized interfaces are + depicted in Figure 5. The EPS provides IP connectivity to UE (i.e., + mobile nodes) and access to operator services, such as global + Internet access and voice communications. The EPS comprises the + radio access network called Evolved Universal Terrestrial Radio + Access Network (E-UTRAN) and the core network called the Evolved + Packet Core (EPC). QoS is supported through an EPS bearer concept, + providing bindings to resource reservation within the network. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kutscher, et al. Informational [Page 22] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + +-------+ + +-------+ | PCRF | + | HSS | /+-------+\ + +-------+ Gx/ \Rx + | / \ + | / \ + | +-------+ SGi +-------+ + | | P-GW |=========| AF | + | +-------+ +-------+ + HPLMN | | + ------------------------------|--------------|---------------------- + VPLMN | | + +-------+ | + | MME | | + /+-------+\ |S8 + S1-MME / \ | + / \S11 | + / \ | + +-----------+ \ | + +----+ LTE-Uu | | \ | + | UE |========| | S1-U +-------+ + +----+ | E-UTRAN |==============| S-GW | + | (eNBs) | +-------+ + | | + +-----------+ + + Figure 5: EPS Architecture Overview (Roaming Case) + + Note: + HPLMN - Home Public Land Mobile Network + VPLMN - Visited Public Land Mobile Network + AF - Application Function + SGi - Service Gateway Interface + LTE-Uu - LTE Radio Interface + + The Evolved NodeB (eNB), the LTE base station, is part of the access + network that provides radio resource management, header compression, + security, and connectivity to the core network through the S1 + interface. In an LTE network, the control-plane signaling traffic + and the data traffic are handled separately. The eNBs transmit the + control traffic and data traffic separately via two logically + separate interfaces. + + The Home Subscriber Server (HSS) is a database that contains user + subscriptions and QoS profiles. The Mobility Management Entity (MME) + is responsible for mobility management, user authentication, bearer + establishment and modification, and maintenance of the UE context. + + + + +Kutscher, et al. Informational [Page 23] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + The Serving Gateway (S-GW) is the mobility anchor and manages the + user-plane data tunnels during the inter-eNB handovers. It tunnels + all user data packets and buffers downlink IP packets destined for + UEs that happen to be in idle mode. + + The PDN Gateway (P-GW) is responsible for IP address allocation to + the UE and is a tunnel endpoint for user-plane and control-plane + protocols. It is also responsible for charging, packet filtering, + and policy-based control of flows. It interconnects the mobile + network to external IP networks, e.g., the Internet. + + In this architecture, data packets are not sent directly on an IP + network between the eNB and the gateways. Instead, every packet is + tunneled over a tunneling protocol -- the GPRS Tunneling Protocol + (GTP) [TS29060] over UDP/IP. A GTP path is identified in each node + with the IP address and a UDP port number on the eNB/gateways. The + GTP protocol carries both the data traffic (GTP-U tunnels) and the + control traffic (GTP-C tunnels [TS29274]). Alternatively, PMIPv6 is + used on the S5 interface between S-GW and P-GW. + + The above is very different from an end-to-end path on the Internet + where the packet forwarding is performed at the IP level. + Importantly, we observe that these tunneling protocols give the + operator a large degree of flexibility to control the congestion + mechanism incorporated with the GTP/PMIPv6 protocols. + +Acknowledgements + + We would like to thank Bob Briscoe and Ingemar Johansson for their + support in shaping the overall idea and in improving the document by + providing constructive comments. We would also like to thank Andreas + Maeder and Dirk Staehle for reviewing the document and for providing + helpful comments. + +Authors' Addresses + + Dirk Kutscher + NEC + Kurfuersten-Anlage 36 + Heidelberg + Germany + + Email: kutscher@neclab.eu + + + + + + + + +Kutscher, et al. Informational [Page 24] + +RFC 7778 ConEx Mobile Scenario March 2016 + + + Faisal Ghias Mir + NEC + Kurfuersten-Anlage 36 + Heidelberg + Germany + + Email: faisal.mir@gmail.com + + + Rolf Winter + NEC + Kurfuersten-Anlage 36 + Heidelberg + Germany + + Email: rolf.winter@neclab.eu + + + Suresh Krishnan + Ericsson + 8400 Blvd Decarie + Town of Mount Royal, Quebec + Canada + + Email: suresh.krishnan@ericsson.com + + + Ying Zhang + Hewlett Packard Labs + 3000 Hannover Street + Palo Alto, CA 94304 + United States + + Email: ying.zhang13@hp.com + + + Carlos J. Bernardos + Universidad Carlos III de Madrid + Av. Universidad, 30 + Leganes, Madrid 28911 + Spain + + Phone: +34 91624 6236 + Email: cjbc@it.uc3m.es + URI: http://www.it.uc3m.es/cjbc/ + + + + + + +Kutscher, et al. Informational [Page 25] + -- cgit v1.2.3