Title: A Differentiated Services Architecture for the Internet
1A Differentiated Services Architecture for the
Internet
- References
- - K. Nichols, V. Jacobson, L. Zhang
- - D. Clark, J. Wroclawski
- Presented by Liping Zhang
2Overview
- Introduction
- Two different service types implementation and
problems - Two-bit differentiated services architecture
- Problems with end-end bandwidth allocation based
on level of marked traffic - Discussion
3Introduction
- Why do we need differentiated services?
- Different users
- Different applications
- Service allocation
- For example, one goal of assured service is to
allocate the bandwidth of the Internet to
different users in a controlled way during
periods of congestion
4How to describe a service
- What is provided to the customer
- E.g., 1 Mbps, continuously available
- To where is this service provided
- A single destination
- A group
- All nodes on local provider
- Everywhere
- Level of assurance provided to service
- What level of performance uncertainty can user
tolerate
5Two distinct service types
- Assured service
- D. Clark
- Premium service
- V. Jacobson
6Assured service
- Provide different levels of best-effort service
at times of network congestion - Expected capacity
- In packets unlikely to be dropped
- Out packets - no assurance
- Queuing
- Best effort
7Mechanism for assured service
Counter
Counter
Out- and in- dropper
First-hop
Host
Marking packets according to the service profile
RIO scheme, packets are treated preferentially
8RIO algorithm
- RED - Random Early Detection
- Packets dropped with low but increasing
probability as queue grows instead of waiting
until it is full and dropping all new packets - RIO
- Run two RED algorithms for in and out with
different dropping frequencies
9Premium service
- Fundamentally different Internet best effort
service - high priority traffic has its own queue
in routers - Shaped, hard-limited to provisioned peak rate
- No bursts are injected into net
- Virtual wire, available whenever needed
- Regular flow pattern, no queuing
- Shared, with best-effort
10Mechanism for premium service
Intra-network
Host
Router
First-hop
H-Q premium, no dropping L-Q best effort,
dropping on congestion
11Two-bit differentiated services architecture
- Deploying both services
- More bits available in IP header, why not both
- Forwarding path mechanisms
- Leaf routers
- Input interface a traffic profile
- Output interface two queues (HQ, LQ)
- Intermediate routers
- Only have forwarding function
- Border routers
- A Profile Meter at the input interface
12Traffic flow from end-host to ISP
Company A
Internal Router
Host
2
Border Router
1
First-hop Router
3
ISP
Border Router
13Forwarding path primitives
- General classifier
- In leaf routers, transport-level signature
matching - Bit-pattern classifier
- Performs a two-way decision based on bit-pattern
- Bit setter
- A- and P-bits must be set or cleared in several
places - Priority queues
- Shaping token bucket
- At the leaf router for Premium traffic
- Policing token bucket
- At border router, for both P and A services
14Block diagram of leaf router input functionality
Marker 1
Flow1
Flow N
Arriving packet
Marker N
Forwarding Engine
Packet Classifier
Clear AP bits
Best Effort
15Markers to implement the two different services
Wait for token
Set P bit
Packet Input
N
Test if token
Set A bit
Packet Input
Y
16Router output interface for two-bit architecture
P-bit set?
High-priority
No
If A-bit set? Inc a_cnt
Low-priority
If A-bit set? dec a_cnt
RIO queue management
17Border router input interface Profile Meters
Token available ?
Clear A bit
N
A set
Y
Forwarding Engine
Is packet marked ?
Not marked
Y
P set
N
Token Available
Drop Packet
18Passing configuration information
- Request to the leaf router
- Average rate, burst, service type (P or A)
- Ways of passing the message
- RSVP, SNMP, network administrator
- Authenticating the sender
19Architectural framework for marked traffic
allocation
- Preconfiguring of usage profiles is practical
- Paying for level of service that is always
available - Allocation follows organizational hierarchies
- Each organization must be responsible for its DM
- Only bilateral agreements work
20Bandwidth Brokers (BB)
- Roles
- Allocating and controlling bandwidth shares
- Responsibilities
- Parcel out a regions marked traffic allocation
and set up the leaf routers within the local
domain - Managing messages sent across boundaries to
adjacent region BBs
21Examples
- A statically configured example with no BB
message exchanged - A statically configured example with BB messages
exchanged - Dynamic allocation and additional mechanism
22(No Transcript)
23(No Transcript)
24(No Transcript)
25(No Transcript)
26(No Transcript)
27(No Transcript)
28(No Transcript)
29(No Transcript)
30RSVP and BBs
- Existing bilateral relations between BBs of
adjacent trust regions are necessary for resource
allocation - A few bits in the packet header are used to mark
the service class - RSVP resource setup hop-by-hop
- Use RSVP between two adjacent ISPs (BB1/BR1 and
BB2/BR2)
31Discussion
- Extensibility of the current 2-bit architecture
- Service allocation for multicast
- Who should request the service
- Sender or receiver
- Deployment issues
- Security issues
322-bit differentiated services architecture
- Providing Controlled-Load and Guaranteed service
- P service for C-L service
- A constrained case of C-L service
- P service for G service
- The service model of P service fits G service
model