1 / 32

A Differentiated Services Architecture for the Internet

A Differentiated Services Architecture for the Internet. References - K. Nichols, V. Jacobson, L. Zhang - D. Clark, J. Wroclawski Presented by Liping Zhang. Overview. Introduction Two different service types: implementation and problems

myra-boone
Download Presentation

A Differentiated Services Architecture for the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Differentiated Services Architecture for the Internet References - K. Nichols, V. Jacobson, L. Zhang - D. Clark, J. Wroclawski Presented by Liping Zhang

  2. Overview • Introduction • Two different service types: implementation and problems • Two-bit differentiated services architecture • Problems with end-end bandwidth allocation based on level of marked traffic • Discussion

  3. Introduction • Why do we need differentiated services? • Different users • Different applications • Service allocation • For example, one goal of assured service is to allocate the bandwidth of the Internet to different users in a controlled way during periods of congestion

  4. How to describe a service • What is provided to the customer • E.g., 1 Mbps, continuously available • To where is this service provided • A single destination • A group • All nodes on local provider • Everywhere • Level of assurance provided to service • What level of performance uncertainty can user tolerate

  5. Two distinct service types • Assured service • D. Clark • Premium service • V. Jacobson

  6. Assured service • Provide different levels of best-effort service at times of network congestion • Expected capacity • “In” packets unlikely to be dropped • “Out” packets - no assurance • Queuing • Best effort

  7. Mechanism for assured service Counter Counter Out- and in- dropper First-hop Host Marking packets according to the service profile RIO scheme, packets are treated preferentially

  8. RIO algorithm • RED - Random Early Detection • Packets dropped with low but increasing probability as queue grows; instead of waiting until it is full and dropping all new packets • RIO • Run two RED algorithms for “in” and “out” with different dropping frequencies

  9. Premium service • Fundamentally different Internet best effort service - high priority traffic has its own queue in routers • Shaped, hard-limited to provisioned peak rate • No bursts are injected into net • Virtual wire, available whenever needed • Regular flow pattern, no queuing • Shared, with best-effort

  10. Mechanism for premium service Intra-network Host Router First-hop H-Q: premium, no dropping L-Q: best effort, dropping on congestion

  11. Two-bit differentiated services architecture • Deploying both services • More bits available in IP header, why not both • Forwarding path mechanisms • Leaf routers • Input interface: a traffic profile • Output interface: two queues (HQ, LQ) • Intermediate routers • Only have forwarding function • Border routers • A Profile Meter at the input interface

  12. Traffic flow from end-host to ISP Company A Internal Router Host 2 Border Router 1 First-hop Router 3 ISP Border Router

  13. Forwarding path primitives • General classifier • In leaf routers, transport-level signature matching • Bit-pattern classifier • Performs a two-way decision based on bit-pattern • Bit setter • A- and P-bits must be set or cleared in several places • Priority queues • Shaping token bucket • At the leaf router for Premium traffic • Policing token bucket • At border router, for both P and A services

  14. Block diagram of leaf router input functionality Marker 1 Flow1 Flow N Arriving packet Marker N Forwarding Engine Clear A&P bits Packet Classifier Best Effort

  15. Markers to implement the two different services Wait for token Set P bit Packet Input N Test if token Set A bit Packet Input Y

  16. Router output interface for two-bit architecture P-bit set? High-priority No If A-bit set? Inc a_cnt Low-priority If A-bit set? dec a_cnt RIO queue management

  17. Border router input interface Profile Meters Token available ? N Clear A bit A set Y Forwarding Engine Is packet marked ? Not marked Y P set N Token Available Drop Packet

  18. Passing configuration information • Request to the leaf router • Average rate, burst, service type (P or A) • Ways of passing the message • RSVP, SNMP, network administrator • Authenticating the sender

  19. Architectural framework for marked traffic allocation • Preconfiguring of usage profiles is practical • Paying for level of service that is always available • Allocation follows organizational hierarchies • Each organization must be responsible for its DM • Only bilateral agreements work

  20. Bandwidth Brokers (BB) • Roles • Allocating and controlling bandwidth shares • Responsibilities • Parcel out a region’s marked traffic allocation and set up the leaf routers within the local domain • Managing messages sent across boundaries to adjacent region BBs

  21. Examples • A statically configured example with no BB message exchanged • A statically configured example with BB messages exchanged • Dynamic allocation and additional mechanism

  22. RSVP and BBs • Existing bilateral relations between BBs of adjacent trust regions are necessary for resource allocation • A few bits in the packet header are used to mark the service class • RSVP resource setup: hop-by-hop • Use RSVP between two adjacent ISPs (BB1/BR1 and BB2/BR2)

  23. Discussion • Extensibility of the current 2-bit architecture • Service allocation for multicast • Who should request the service • Sender or receiver • Deployment issues • Security issues

  24. 2-bit differentiated services architecture • Providing Controlled-Load and Guaranteed service • P service for C-L service • A constrained case of C-L service • P service for G service • The service model of P service fits G service model

More Related