|
IETF workgroup as part of transport area workgroup.
|
|
Formal work started April 1998 at IETF in Los Angeles with framework document
|
www.ietf.org/html.charters/diffserv-charter.html
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Network Service Providers want to:
|
| |
Offer a Scalable Service Differentiation (defined in SLA's) in stead of current best effort service.
|
| |
Improve revenues through premium pricing and competitive differentiation.
|
Applications seek better than best effort:
|
| |
Packet loss characteristics.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
|
DS is a relatively simple and coarse method to provide differentiated Classes of Service.
|
|
Offers a small well defined set of building blocks from which several services may be built.
|
|
Packet flows are classified (marked) at the network ingress and receive a certain forwarding treatment in the network.
|
|
Multiple queuing mechanisms offer differentiated forwarding treatments.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
|
Create common understanding of forwarding treatment
|
|
Agree on common packet marking semantics
|
|
Establish commonly understood service categories
|
|
experiment with forward treatments to identify additional services.
|
|
Investigate additional components such as traffic shapers & packets markers needed at network boundaries.
|
|
Define mechanisms such as LDAP schemata to map service profiles into Differentiated Services at the network boundary.
|
|
Analyze security threats, such as theft of service.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
| |
Significant Characteristic of packet transmission in one direction across a set of one or more paths.
|
Characteristic Specification
|
| |
In quantitative/statistical terms of throughput, delay, packet loss or jitter.
|
| |
In terms of relative priority of access.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Service Provider Requirements
|
---|
| |
ISP requirements are driving force
|
|
Permit differentiated pricing
|
|
RSVP less attractive as it is perceived:
|
| |
Too complex (read granular).
|
| |
Not scalable to large aggregates: requires per flow state
|
| |
As per Chicago IETF: MPLS seems strategic direction for binding RSVP flows to labels. (draft-ietf-mpls-rsvp-00.txt)
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Wed Mar 27 17:35:47 CST 2013
Untitled Document
| |
Architecture implements per node:
|
| |
Small set of queuing characteristics
|
| |
Packet classification functions.
|
| |
marking of packets through DS codepoints.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Classification and conditioning only at boundary nodes.
|
Apply PHB to aggregates of marked traffic in core of network.
|
PHB does not need to maintain a state per flow - core routers are flow-unaware.
|
Service provisioning and traffic conditioning can be separated from forwarding behavior.
|
Does not rely on hop by hop application signaling.
|
Compliant with existing non-DS network nodes.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
Fixed SLA: (Statical Implementation)
|
| |
fixed agreements which may identify periods of time during which a certain service level can be offered
|
Dynamic SLA (Dynamical Implementation)
|
| |
Requires the provider network to adopt dynamic, automated resource provisioning mechanisms. (bandwidth brokers representing current network load)
|
| |
Requires customer equipment to adapt to dynamic SLA¡¦s using some kind of signaling.
|
Wed Mar 27 17:35:47 CST 2013
Untitled Document
| |
SLA¡¦s require the service provider to setup traffic conditioning components in order to protect the providers network:
|
Meters
| measures conformance to a profile and provides input for below components implementing policing
Markers
| police by demoting packets by remarking.
Shapers
| add delay to packets such that its rate conforms.
Droppers
| exceeding rate packets are dropped.
| | | |
Users must also be authenticated
|
| |
(by physical connection or by cryptographic means)
|
Wed Mar 27 17:35:48 CST 2013
Untitled Document
|
Traffic classifiers in boundary devices
|
|
May separate traffic based on:
|
| |
Based on multiple fields within the packet header and payload (MF classifier) offering certain per micro-flow services to non-DS clients.
|
| |
Customer must mark & shape and provider polices (meters, drops and remarks)
|
| |
Provider is able to classify/shape as an additional service
|
Wed Mar 27 17:35:48 CST 2013
Untitled Document
Expedited Forwarding (EF)
|
www.ietf.org/internet-drafts/drafts-ietf-diffserv-phb-ef-01.txt
www.ietf.org/internet-drafts/drafts-ietf-diffserv-af-03.txt
|
Virtual Leased Line (Premium Service) based on EF
|
|
Olympic Service (Gold, Silver and Bronze).
|
Wed Mar 27 17:35:48 CST 2013
Untitled Document
|
Low loss, low latency, low jitter with assured bandwidth.
|
|
Strict enforcement of traffic level.
|
|
Strict queuing treatment.
|
|
Strict administration of aggregate traffic levels to prevent queuing of EF traffic.
|
| |
(Non-EF traffic will get queued and/or dropped).
|
|
PHB can be implemented by more then one mechanism:
|
| |
A queue with the highest priority with token bucket rate policer at ingress.
|
| |
Single queue in a weighted round robin scheduler where weight is equal to bandwidth assigned.
|
|
Looks like a virtual leased line
|
Paper Details
Wed Mar 27 17:35:48 CST 2013
Untitled Document
|
4 classes with each 3 different levels of drop priority
|
|
No re-ordering of packets if packets belong to same class.
|
|
Each class can be allocated a certain amount of forwarding resources.
|
|
Traffic conditioning MAY be done at the boundary.
|
|
RED like discarding algorithm is RECOMMENDED and thresholds MUST be configurable.
|
|
Exceeding traffic may be assigned a higher drop precedence
|
|
Looks a bit like ABR with a certain minimum rate, peak rate and maximum burst size.
|
Wed Mar 27 17:35:48 CST 2013
Untitled Document
| |
SSR implements DS components (in stages):
|
Traffic classification mechanisms:
|
| |
Multi Field layer 2,3 and 4
|
WRED
Flow rate monitoring & policing thru token bucket algorithm (configurable 20ƒÝS-2S)
|
Wed Mar 27 17:35:48 CST 2013
Untitled Document
Understand application QoS requirements is number 1 problem:
|
|
need for absolute per-flow assurances.
|
|
adaptiveness of applications
|
|
split single application into multiple flows with relative precedence
|
Investigate applicability of service types.
|
Investigate interoperability between DS aware domains
|
Investigate Security and Admission.
|
Wed Mar 27 17:35:48 CST 2013