Вы находитесь на странице: 1из 54

15-441 Computer Networking

Intserv, Diffserv, RSVP

Motivation
Internet currently provides only single class of best-effort service.
No admission control and no assurances about delivery

Existing applications are elastic.


Tolerate delays and losses Can adapt to congestion

Future real-time applications may be inelastic. Should we modify these applications to be more adaptive or should we modify the Internet to support inelastic behavior?
Lecture 22: 11/20/2001 2

Application Types
Elastic applications.
Wide range of acceptable rates, although faster is better E.g., data transfers such as FTP

Continuous media applications.


Lower and upper limit on acceptable performance Sometimes called tolerant real-time since they can adapt to the performance of the network
E.g., changing frame rate of video stream Network-aware applications

Hard real-time applications.


Require hard limits on performance intolerant real-time E.g., control applications

Lecture 22: 11/20/2001

Improving QOS in IP Networks


IETF groups are working on proposals to provide better QOS control in IP networks, i.e., going beyond best effort to provide some assurance for QOS. Work in Progress includes RSVP, Differentiated Services, and Integrated Services.

Lecture 22: 11/20/2001

Overview
Principles for QoS Integrated Services (Intserv) Differentiated Services (Diffserv) Resource ReSerVation Protocol (RSVP)

Lecture 22: 11/20/2001

Principles for QOS Guarantees


Simple model for sharing and congestion studies (dumbell topology):

Lecture 22: 11/20/2001

Principles for QOS Guarantees (more)


Consider a phone application at 1Mbps and an FTP application sharing a 1.5 Mbps link.
Bursts of FTP can congest the router and cause audio packets to be dropped. Want to give priority to audio over FTP.

PRINCIPLE 1: Marking of packets is needed for router to distinguish between different classes; and new router policy to treat packets accordingly.

Lecture 22: 11/20/2001

Principles for QOS Guarantees (more)


Applications misbehave (audio sends packets at a rate higher than 1Mbps assumed above). PRINCIPLE 2: provide protection (isolation) for one class from other classes. Require Policing Mechanisms to ensure sources adhere to bandwidth requirements; Marking and Policing need to be done at the edges:

Lecture 22: 11/20/2001

Principles for QOS Guarantees (more)


Alternative to Marking and Policing: allocate a set portion of bandwidth to each application flow; can lead to inefficient use of bandwidth if one of the flows does not use its allocation. PRINCIPLE 3: While providing isolation, it is desirable to use resources as efficiently as possible.

Lecture 22: 11/20/2001

Principles for QOS Guarantees (more)


Cannot support traffic beyond link capacity. PRINCIPLE 4: Need a Call Admission Process; application flow declares its needs, network may block call if it cannot satisfy the needs .

Lecture 22: 11/20/2001

10

Summary

Lecture 22: 11/20/2001

11

A Short History of Internet QoS


Lots of initial research in the late 80s and early 90s.
Often takes a telecommunications view of the network.

ATM QoS and Integrated services were developed based on these results.
Focus on per-flow, hard QoS. Effort was driven by perceived application needs.

In the last 5 years, the focus has shifted towards Differentiated services.
Focus is on QoS for flow aggregates, e.g., all the flows belonging to one customer.
Lecture 22: 11/20/2001 12

Overview
Motivation for QoS Integrated Services (Intserv) Differentiated Services (Diffserv) Resource ReSerVation Protocol (RSVP)

Lecture 22: 11/20/2001

13

IETF Intserv
Focus on per-flow QoS.
Support specific applications such as video streaming. Based on mathematical guarantees.

Many concerns:
Complexity Scalability Business model Charging

Lecture 22: 11/20/2001

14

Components of Integrated Services


Type of service model
What does the network promise?

Service interface
How does the application describe what it wants?

Packet scheduling
How does the network meet promises?

Establishing the guarantee


How is the promise communicated to/from the network? How is admission of new applications controlled?

Lecture 22: 11/20/2001

15

Service Models
Network can support traffic streams with different quality of service.
Best effort Predictive or differentiated services Strong guarantees on the level of service (real-time)

The set of services that is supported on a specific network can be viewed as a service model.
Model that can be used to select a service
E.g., cost versus performance tradeoffs

Network architecture that supports the set of services


Considers interactions between services

Lecture 22: 11/20/2001

16

Service Models
Guaranteed service
Targets hard real-time applications. User specifies traffic characteristics and a service requirement. Requires admission control at each of the routers. Can mathematically guarantee bandwidth, delay, and jitter.

Controlled load.
Targets applications that can adapt to network conditions within a certain performance window. User specifies traffic characteristics and bandwidth. Requires admission control at each of the routers. Guarantee not as strong as with the guaranteed service. e.g., measurement-based admission control.

Best effort
Lecture 22: 11/20/2001 17

Service Interface
Session must first declare its QoS requirement and characterize the traffic it will send through the network R-spec: defines the QoS being requested by receiver (e.g., rate r) T-spec: defines the traffic characteristics of sender (e.g., leaky bucket with rate r and buffer size b). A signaling protocol is needed to carry the R-spec and Tspec to the routers where reservation is required; RSVP is a leading candidate for such signaling protocol.

Lecture 22: 11/20/2001

18

Packet scheduling
Guaranteed service
Use token bucket filter to characterize traffic
Described by rate r and bucket depth b

Use WFQ at the routers Parekhs bound for worst case queuing delay = b/r

Lecture 22: 11/20/2001

19

Call Admission
Call Admission: routers will admit calls based on their R-spec and T-spec and base on the current resource allocated at the routers to other calls.

Lecture 22: 11/20/2001

20

Overview
Motivation for QoS Integrated Services (Intserv) Differentiated Services (Diffserv) Resource ReSerVation Protocol (RSVP)

Lecture 22: 11/20/2001

21

Differentiated Services
Intended to address the following difficulties with Intserv and RSVP; Scalability: maintaining states by routers in high speed networks is difficult due to the very large number of flows Flexible Service Models: Intserv has only two classes, want to provide more qualitative service classes; want to provide relative service distinction (Platinum, Gold, Silver, ) Simpler signaling: (than RSVP) many applications and users may only want to specify a more qualitative notion of service

Lecture 22: 11/20/2001

22

Diffserv - Motivation
Do fine-grained enforcement only at the edge of the network.
Typically slower links at edges E.g., mail sorting in post office

Label packets with a field.


E.g., a priority stamp

The core of the network uses only the type field for QoS management.
Small number of types with well defined forwarding behavior Can be handled fast

Example: expedited service versus best effort Evolution rather than revolution
Lecture 22: 11/20/2001 23

Diffserv - Discussion
Diffserv defines an architecture and a set of forwarding behaviors.
It is up to the service providers to define and implement end-to-end services on top of this architecture. Offers a more flexible service model; different providers can offer different service.

One of the main motivations for Diffserv is scalability.


Keep the core of the network simple.

Focus of Diffserv is on supporting QoS for flow aggregates.


Although architecture does not preclude more fine-grained guarantees.

Lecture 22: 11/20/2001

24

Edge Router/Host Functions


Classification: marks packets according to classification rules to be specified. Metering: checks whether the traffic falls within the negotiated profile. Marking: marks traffic that falls within profile. Conditioning: delays and then forwards, discards, or remarks other traffic.
Lecture 22: 11/20/2001 25

Classification and Conditioning


Packet is marked in the Type of Service (TOS) in IPv4, and Traffic Class in IPv6. 6 bits used for Differentiated Service Code Point (DSCP) and determine PHB that the packet will receive. 2 bits are currently unused.

Lecture 22: 11/20/2001

26

Core Functions
Forwarding: according to Per-Hop-Behavior or PHB specified for the particular packet class; such PHB is strictly based on class marking (no other header fields can be used to influence PHB). BIG ADVANTAGE: No state info to be maintained by routers!

Lecture 22: 11/20/2001

27

Forwarding (PHB)
PHB result in a different observable (measurable) forwarding performance behavior. PHB does not specify what mechanisms to use to ensure required PHB performance behavior. Examples:
Class A gets x% of outgoing link bandwidth over time intervals of a specified length. Class A packets leave first before packets from class B.

Lecture 22: 11/20/2001

28

Forwarding (PHB)
Expedited Forwarding (EF):
Guarantees a certain minimum rate for the EF traffic. Implies isolation: guarantee for the EF traffic should not be influenced by the other traffic classes. Admitted based on peak rate. Non-conformant traffic is dropped or shaped. Possible service: providing a virtual wire.

Lecture 22: 11/20/2001

29

Forwarding (PHB)
Assured Forwarding (AF):
AF defines 4 classes with some bandwidth and buffers allocated to them. The intent is that it will be used to implement services that differ relative to each other (e.g., gold, silver,). Within each class, there are three drop priorities, which affect which packets will get dropped first if there is congestion. Lots of studies on how these classes and drop priorities interact with TCP flow control. Non-conformant traffic is remarked.
Lecture 22: 11/20/2001 30

Example of EF: A Virtual Leased Line Service


Service offers users a dedicated traffic pipe.
Guaranteed bandwidth between two points. Very low latency and jitter since there should be no queuing delay (peak rate allocation).

Admission control makes sure that all links in the network core have sufficient EF bandwidth.
Simple case: sum of all virtual link bandwidth is less than the capacity of the slowest link.

Traffic enforcement for EF traffic limits how much EF traffic enters the network.
Lecture 22: 11/20/2001 31

Differentiated Services Issues


AF and EF are not even in a standard track yet research ongoing. The key to making Diffserv work is bandwidth management in the network core.
Simple for simple services such as the virtual pipe, but it is much more challenging for complex service level agreements. Notion of a bandwidth broker that manages the core network bandwidth.

Definition of end-to-end services for paths that cross networks with different forwarding behaviors
Some packets will be handled differently in different routers. Some routers are not DiffServ capable.

Lecture 22: 11/20/2001

32

Overview
Motivation for QoS Integrated Services (Intserv) Differentiated Services (Diffserv) Resource ReSerVation Protocol (RSVP)

Lecture 22: 11/20/2001

33

Components of Integrated Services


Type of service model
What does the network promise?

Service interface
How does the application describe what it wants?

Packet scheduling
How does the network meet promises?

Establishing the guarantee


How is the promise communicated to/from the network How is admission of new applications controlled?

Lecture 22: 11/20/2001

34

Role of RSVP
Rides on top of unicast/multicast routing protocols. Must be present at sender(s), receiver(s), and routers. Carries resource requests all the way through the network. At each hop consults admission control and sets up reservation. Informs requester if failure.

Lecture 22: 11/20/2001

35

Reservation Protocol: RSVP

Upper layer protocols and applications IP service interface IP


ICMP IGMP RSVP

Link layer service interface Link layer modules

Lecture 22: 11/20/2001

36

RSVP Goals
Used on connectionless networks.
Should not replicate routing functionality. Should co-exist with route changes.

Support for multicast.


Different receivers have different capabilities and want different QOS. Changes in group membership should not be expensive. Reservations should be aggregate I.e. each receiver in group should not have to reserve. Should be able to switch allocated resource to different senders.

Limit control overhead. Modular design should be generic signaling protocol. Result:
Receiver-oriented Soft-state

Lecture 22: 11/20/2001

37

Receiver-Initiated Reservation
Receiver initiates reservation by sending a reservation over the sink tree.
Assumes multicast tree has been set up previously.
Also uses receiver-initiated mechanism.

Hooks up with the reserved part of the tree. How far the request has to travel to the source depends on the level of service requested. Uses existing routing protocol, but routers have to store the sink tree (reverse path from forwarding path).

Properties:
Scales well: can have parallel independent connect and disconnect actions single shared resource required. Supports receiver heterogeneity: reservation specifies receiver requirements and capabilities.
Lecture 22: 11/20/2001 38

Soft State
Routers keep state about reservation. Periodic messages refresh state. Non-refreshed state times out automatically. Alternative: Hard state
No periodic refresh messages. State is guaranteed to be there. State is kept till explicit removal. Why could there be a problem?

Properties of soft state:


Adapts to changes in routes, sources, and receivers. Recovers from failures Cleans up state after receivers drop outs

Philosophy: reservation is an optimization.


Lecture 22: 11/20/2001 39

RSVP Service Model


Make reservations for simplex data streams. Receiver decides whether to make reservation
Control messages in IP datagrams (proto #46).

PATH/RESV messages sent periodically to refresh soft state. One pass:


Failed requests return error messages - receiver must try again. No end to end ack for success.

Lecture 22: 11/20/2001

40

Basic Message Types


PATH message RESV message CONFIRMATION message
Generated only upon request. Unicast to receiver when RESV reaches node with established state.

TEARDOWN message ERROR message (if PATH or RESV fails)

Lecture 22: 11/20/2001

41

PATH Messages
PATH messages carry senders T-spec.
Token bucket parameters

Routers note the direction PATH messages arrived and set up reverse path to sender. Receivers send RESV messages that follow reverse path and setup reservations. If reservation cannot be made, user gets an error.

Lecture 22: 11/20/2001

42

RESV Messages
RESV messages carry receivers R-spec. Forwarded via reverse path of PATH. Queuing delay and bandwidth requirements. Source traffic characteristics (from PATH). Filter specification
Which transmissions can use the reserved resources? Reservation style.

Router performs admission control and reserves resources.


Lecture 22: 11/20/2001 43

Router Handling of RESV Messages


If new request rejected, send error message. If admitted:
Install packet filter into forwarding dbase. Pass flow parameters to scheduler. Activate packet policing if needed. Forward RESV message upstream.

Lecture 22: 11/20/2001

44

RSVP reservations
Reservations from multiple receivers for a single sender are merged together at branching points. Reservations for multiple senders may be added up:
Video conference

Reservations for multiple senders may not be added up:


Audio conference, not many talk at same time. Only subset of speakers (filters).

Lecture 22: 11/20/2001

45

Reservation Styles
Three styles
Wildcard/No filter does not specify a particular sender for group. Fixed filter sender explicitly specified for a reservation.
Video conference

Dynamic filter valid senders may be changed over time.


Audio conference

Lecture 22: 11/20/2001

46

Example

A S1 B S2, S3

R1

R2 R3

Senders S1, S1, S3 Receivers R1, R2, R3 Router interfaces A,B,C,C


Lecture 22: 11/20/2001 47

Wildcard Filter Reservation


R1, R2, and R3 want to reserve 4b, 3b, and 2b, respectively (b is given rate).
4b S1 4b S2, S3 B A 4b R1

D 3b

R2 R3

Lecture 22: 11/20/2001

48

Fixed Filter Reservation


R1 wants to reserve 4b for S1 and 5b for S2. R2 wants to reserve 3b for S1 and b for S3. R3 wants to reserve b for S1.
S1:4b A S1 B S2, S3 S2:5b S3:b
Lecture 22: 11/20/2001

S1:4b S2:5b

R1

D S1:3b S3:b

R2 R3

49

Dynamic Filter Reservation


R1 wants to reserve b for S1 and S2 (shared). R2 wants to reserve 3b for S1 and S3 (shared). R3 wants to reserve 2b for S2.
S1:3b A S1 B S2, S3 (S2,S3):3b C (S1,S2):b R1

D (S1,S2,S3):3b

R2 R3

Lecture 22: 11/20/2001

50

Changing Reservation
Receiver-oriented approach and soft state make it easy to modify reservation. Modification sent with periodic refresh.

Lecture 22: 11/20/2001

51

Routing Changes
Routing protocol makes routing changes. In absence of route or membership changes, periodic PATH and RESV messages refresh established reservation state. When change, new PATH messages follow new path, new RESV messages set reservation. Non-refreshed state times out automatically.

Lecture 22: 11/20/2001

52

State in Switches
Have to keep sink tree information.
No such thing as inverse multicast routing.

Also have to keep information on sources if filters are used.


Selected in path message. Used in aggregation and propagating information to switches.

Also used in limiting protocol overhead.


Switches do not propagate periodic reservation and path messages. They periodically regenerate copies that summarize the information they have.

Raises concerns about scalability.


Lecture 22: 11/20/2001 53

RSVP - Review
Concentration on multicast may have been wrong idea.
Unicast considered as special case of multicast.

Receiver initiation handle negotiation at application level. Receiver heterogeneity how can low-capability receiver benefit from video sent at high bandwidth?
Layered encoding

Soft state
Hard state works in telephony network
Lecture 22: 11/20/2001 54

Вам также может понравиться