1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
|
<pre>Network Working Group R. Bless
Request for Comments: 3662 Univ. of Karlsruhe
Category: Informational K. Nichols
Consultant
K. Wehrle
Univ. of Tuebingen/ICSI
December 2003
<span class="h1">A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</span>
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved.
Abstract
This document proposes a differentiated services per-domain behavior
(PDB) whose traffic may be "starved" (although starvation is not
strictly required) in a properly functioning network. This is in
contrast to the Internet's "best-effort" or "normal Internet traffic"
model, where prolonged starvation indicates network problems. In
this sense, the proposed PDB's traffic is forwarded with a "lower"
priority than the normal "best-effort" Internet traffic, thus the PDB
is called "Lower Effort" (LE). Use of this PDB permits a network
operator to strictly limit the effect of its traffic on "best-
effort"/"normal" or all other Internet traffic. This document gives
some example uses, but does not propose constraining the PDB's use to
any particular type of traffic.
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Description of the Lower Effort PDB</span>
This document proposes a differentiated services per-domain behavior
[<a href="./rfc3086" title=""Definition of Differentiated Services Per Domain Behaviors and Rules for their Specification"">RFC3086</a>] called "Lower Effort" (LE) which is intended for traffic of
sufficiently low value (where "value" may be interpreted in any
useful way by the network operator), in which all other traffic takes
precedence over LE traffic in consumption of network link bandwidth.
One possible interpretation of "low value" traffic is its low
priority in time, which does not necessarily imply that it is
generally of minor importance. From this viewpoint, it can be
<span class="grey">Bless, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
considered as a network equivalent to a background priority for
processes in an operating system. There may or may not be memory
(buffer) resources allocated for this type of traffic.
Some networks carry traffic for which delivery is considered
optional; that is, packets of this type of traffic ought to consume
network resources only when no other traffic is present.
Alternatively, the effect of this type of traffic on all other
network traffic is strictly limited. This is distinct from "best-
effort" (BE) traffic since the network makes no commitment to deliver
LE packets. In contrast, BE traffic receives an implied "good faith"
commitment of at least some available network resources. This
document proposes a Lower Effort Differentiated Services per-domain
behavior (LE PDB) [<a href="./rfc3086" title=""Definition of Differentiated Services Per Domain Behaviors and Rules for their Specification"">RFC3086</a>] for handling this "optional" traffic in a
differentiated services domain.
There is no intrinsic reason to limit the applicability of the LE PDB
to any particular application or type of traffic. It is intended as
an additional tool for administrators in engineering networks.
Note: where not otherwise defined, terminology used in this document
is defined as in [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>].
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Applicability</span>
A Lower Effort (LE) PDB is for sending extremely non-critical traffic
across a DS domain or DS region. There should be an expectation that
packets of the LE PDB may be delayed or dropped when other traffic is
present. Use of the LE PDB might assist a network operator in moving
certain kinds of traffic or users to off-peak times. Alternatively,
or in addition, packets can be designated for the LE PDB when the
goal is to protect all other packet traffic from competition with the
LE aggregate, while not completely banning LE traffic from the
network. An LE PDB should not be used for a customer's "normal
internet" traffic, nor should packets be "downgraded" to the LE PDB
for use as a substitute for dropping packets that ought to simply be
dropped as unauthorized. The LE PDB is expected to be applicable to
networks that have some unused capacity at some times of day.
This is a PDB that allows networks to protect themselves from
selected types of traffic rather than giving a selected traffic
aggregate preferential treatment. Moreover, it may also exploit all
unused resources from other PDBs.
<span class="grey">Bless, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Technical Specification</span>
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Classification and Traffic Conditioning</span>
There are no required traffic profiles governing the rate and bursts
of packets beyond the limits imposed by the ingress link. It is not
necessary to limit the LE aggregate using edge techniques since its
PHB is configured such that packets of the aggregate will be dropped
in the network if no forwarding resources are available. The
differentiated services architecture [<a href="./rfc2475" title=""An Architecture for Differentiated Services"">RFC2475</a>] allows packets to be
marked upstream of the DS domain or at the DS domain's edge. When
packets arrive pre-marked with the DSCP used by the LE PDB, it should
not be necessary for the DS domain boundary to police that marking;
further (MF) classification for such packets would only be required
if there was some reason for the packets to be marked with a
different DSCP.
If there is not an agreement on a DSCP marking with the upstream
domain for a DS domain using the LE PDB, the boundary must include a
classifier that selects the appropriate LE target group of packets
out of all arriving packets and steers them to a marker that sets the
appropriate DSCP. No other traffic conditioning is required.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. PHB configuration</span>
Either a Class Selector (CS) PHB [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>], an Experimental/Local Use
(EXP/LU) PHB [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>], or an Assured Forwarding (AF) PHB [<a href="./rfc2597" title=""Assured Forwarding PHB Group"">RFC2597</a>]
may be used as the PHB for the LE traffic aggregate. This document
does not specify the exact DSCP to use inside a domain, but instead
specifies the necessary properties of the PHB selected by the DSCP.
If a CS PHB is used, Class Selector 1 (DSCP=001000) is suggested.
The PHB used by the LE aggregate inside a DS domain should be
configured so that its packets are forwarded onto the node output
link when the link would otherwise be idle; conceptually, this is the
behavior of a weighted round-robin scheduler with a weight of zero.
An operator might choose to configure a very small link share for the
LE aggregate and still achieve the desired goals. That is, if the
output link scheduler permits, a small fixed rate might be assigned
to the PHB, but the behavior beyond that configured rate should be
that packets are forwarded only when the link would otherwise be
idle. This behavior could be obtained, for example, by using a CBQ
[<a href="#ref-CBQ" title=""Link-sharing and Resource Management Models for Packet Networks"">CBQ</a>] scheduler with a small share and with borrowing permitted. A
PHB that allows packets of the LE aggregate to send more than the
configured rate when packets of other traffic aggregates are waiting
for the link is not recommended.
<span class="grey">Bless, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
If a CS PHB is used, note that this configuration will violate the
"SHOULD" of <a href="./rfc2474#section-4.2.2.2">section 4.2.2.2 of RFC 2474</a> [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>] since CS1 will have
a less timely forwarding than CS0. An operator's goal of providing
an LE PDB is sufficient cause for violating the SHOULD. If an AF PHB
is used, it must be configured and a DSCP assigned such that it does
not violate the "MUST" of paragraph three of <a href="./rfc2597#section-2">section 2 of RFC 2597</a>
[<a href="./rfc2597" title=""Assured Forwarding PHB Group"">RFC2597</a>] which provides for a "minimum amount of forwarding
resources".
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Attributes</span>
The ingress and egress flow of the LE aggregate can be measured but
there are no absolute or statistical attributes that arise from the
PDB definition. A particular network operator may configure the DS
domain in such a way that a statistical metric can be associated with
that DS domain. When the DS domain is known to be heavily congested
with traffic of other PDBs, a network operator should expect to see
no (or very few) packets of the LE PDB egress from the domain. When
there is no other traffic present, the proportion of the LE aggregate
that successfully crosses the domain should be limited only by the
capacity of the network relative to the ingress LE traffic aggregate.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Parameters</span>
None required.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Assumptions</span>
A properly functioning network.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Example uses</span>
o Multimedia applications [this example edited from Yoram Bernet]:
Many network managers want to protect their networks from certain
applications, in particular, from multimedia applications that
typically use such non-adaptive protocols as UDP.
Most of the focus in quality-of-service is on achieving attributes
that are better than Best Effort. These approaches can provide
network managers with the ability to control the amount of
multimedia traffic that is given this improved performance with
excess relegated to Best Effort. This excess traffic can wreak
havoc with network resources even when it is relegated to Best
Effort because it is non-adaptive and because it can be
significant in volume and duration. These characteristics permit
it to seize network resources, thereby compromising the
performance of other, more important applications that are
<span class="grey">Bless, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
included in the Best Effort traffic aggregate but that use
adaptive protocols (e.g., TCP). As a result, network managers
often simply refuse to allow multimedia applications to be
deployed in resource constrained parts of their network.
The LE PDB enables a network manager to allow the deployment of
multimedia applications without losing control of network
resources. A limited amount of multimedia traffic may (or may
not) be assigned to PDBs with attributes that are better than Best
Effort. Excess multimedia traffic can be prevented from wreaking
havoc with network resources by forcing it to the LE PDB.
o For Netnews and other "bulk mail" of the Internet.
o For "downgraded" traffic from some other PDB when this does not
violate the operational objectives of the other PDB or the overall
network. As noted in <a href="#section-2">section 2</a>, LE should not be used for the
general case of downgraded traffic, but may be used by design,
e.g., when multicast is used with a value-added DS-service and
consequently the Neglected Reservation Subtree problem [<a href="#ref-NRS" title=""Group Communication in Differentiated Services Networks"">NRS</a>]
arises.
o For content distribution, peer-to-peer file sharing traffic, and
the like.
o For traffic caused by world-wide web search engines while they
gather information from web servers.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Experiences</span>
The authors solicit further experiences for this section. Results
from simulations are presented and discussed in <a href="#appendix-A">Appendix A</a>.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Security Considerations for LE PDB</span>
There are no specific security exposures for this PDB. See the
general security considerations in [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>] and [<a href="./rfc2475" title=""An Architecture for Differentiated Services"">RFC2475</a>].
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. History of the LE PDB</span>
The previous name of this PDB, "bulk handling", was loosely based on
the United States' Postal Service term for very low priority mail,
sent at a reduced rate: it denotes a lower-cost delivery where the
items are not handled with the same care or delivered with the same
timeliness as items with first-class postage. Finally, the name was
changed to "lower effort", because the authors and other DiffServ
Working Group members believe that the name should be more generic in
order to not imply constraints on the PDB's use to a particular type
<span class="grey">Bless, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
of traffic (namely that of bulk data).
The notion of having something "lower than Best Effort" was raised in
the Diffserv Working Group, most notably by Roland Bless and Klaus
Wehrle in their Internet Drafts [<a href="#ref-LBE" title=""A Lower Than Best-Effort Per-Hop Behavior"">LBE</a>] and [<a href="#ref-LE" title=""A Limited Effort Per-Hop Behavior"">LE</a>] and by Yoram Bernet
for enterprise multimedia applications. One of its first
applications was to re-mark packets within multicast groups [<a href="#ref-NRS" title=""Group Communication in Differentiated Services Networks"">NRS</a>].
Therefore, previous discussions centered on the creation of a new
PHB. However, the original authors (Brian Carpenter and Kathleen
Nichols) believe this is not required and this document was written
to specifically explain how to get less than Best Effort without a
new PHB.
<span class="h2"><a class="selflink" id="section-11" href="#section-11">11</a>. Acknowledgments</span>
Yoram Bernet contributed significant amounts of text for the
"Examples" section of this document and provided other useful
comments that helped in editing. Other Diffserv WG members suggested
that the LE PDB is needed for Napster traffic, particularly at
universities. Special thanks go to Milena Neumann for her extensive
efforts in performing the simulations that are described in <a href="#appendix-A">Appendix</a>
<a href="#appendix-A">A</a>.
<span class="grey">Bless, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. Experiences from a Simulation Model</span>
The intention of this appendix is to show that a Lower Effort PDB
with a behavior as described in this document can be realized with
different implementations and PHBs respectively. Overall, each of
these variants show the desired behavior but also show minor
differences in certain traffic load situations. This comparison
could make the choice of a realization variant interesting for a
network operator.
<span class="h3"><a class="selflink" id="appendix-A.1" href="#appendix-A.1">A.1</a>. Simulation Environment</span>
The small DiffServ domain shown in Figure 1 was used to simulate the
LE PDB. There are three main sources of traffic (S1-S3) depicted on
the left side of the figure. Source S1 sends five aggregated TCP
flows (A1-A5) to the receivers R1-R5 respectively. Each aggregated
flow Ax consists of 20 TCP connections, where each aggregate
experiences a different round trip time between 10ms and 250ms.
There are two sources of bulk traffic. B1 consists of 100 TCP
connections sending as much data as possible to R6 and B2 is a single
UDP flow also sending as much as possible to R7.
...................
. . R1
. . /
. . /-R2
. . /
S1==**=>[BR1] [BR4]==**==>---R3
. \\ // . \
. \\ // . \-R4
. ** ** . \
. \\ // . R5
. \\ // .
S2=++=>[BR2]-++-[IR1]==**==++==::==[IR2] .
(Bulk) . // \\ .
. // :: .
. :: \\ .
. // ++ .
.// \\.
S3==::==>[BR3] [BR5]==++==>R6
(UDP) . . ||
. . ||
. . ::
.................... ||
VV
R7
Figure 1: A DiffServ domain with different flows
<span class="grey">Bless, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
In order to show the benefit of using the LE PDB instead of the
normal Best Effort (BE) PDB [<a href="./rfc3086" title=""Definition of Differentiated Services Per Domain Behaviors and Rules for their Specification"">RFC3086</a>], different scenarios are used:
A) B1 and B2 are not present, i.e., the "normal" situation without
bulk data present. A1-A5 use the BE PDB.
B) B1 and B2 use the BE PDB for their traffic, too.
C) B1 and B2 use LE PDB for their traffic with different PHB
implementations:
1) PHB with Priority Queueing (PQ)
2) PHB with Weighted Fair Queueing (WFQ)
3) PHB with Weighted RED (WRED)
4) PHB with WFQ and RED
C1) represents the case where there are no allocated resources for
the LE PDB, i.e., LE traffic is only forwarded if there are unused
resources. In scenarios C2)-C4), a bandwidth share of 10% has been
allocated for the LE PDB. RED parameters were set to w_q=0.1 and
max_p=0.2. In scenario C2), two tail drop queues were used for BE
and LE and WFQ scheduling was set up with a weight of 9:1 for the
ratio of BE:LE. In scenario C3), a total queue length of 200000
bytes was used with the following thresholds: min_th_BE=19000,
max_th_BE=63333, min_th_LE=2346, max_th=7037. WRED allows to mark
packets with BE or LE within the same microflow (e.g., letting
applications pre-mark packets according to their importance) without
causing a reordering of packets within the microflow. In scenario
C4), each queue had a length of 50000 bytes with the same thresholds
of min_th=18000 and max_th=48000 bytes. WFQ parameters were the same
as in C2).
The link bandwidth between IR1 and IR2 is limited to 1200 kbit/s,
thus creating the bottleneck in the network for the following
situations. In all situations, the 20 TCP connections within each
aggregated flow Ax (flowing from S1 to Rx) used the Best Effort PDB.
Sender S2 transmitted bulk flow B1 (consisting of 100 TCP connections
to R6) with an aggregated rate of 550 kbit/s, whereas the UDP sender
S3 transmitted with a rate of 50 kbit/s.
<span class="grey">Bless, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
The following four different situations with varying traffic load for
the Ax flows (at application level) were simulated.
Situation | I | II | III | IV |
----------------------------+------+------+------+------|
Sender Rate S1 [kbit/s] | 1200 | 1080 | 1800 | 800 |
Sender Rate S2 [kbit/s] | 550 | 550 | 550 | 550 |
Sender Rate S3 [kbit/s] | 50 | 50 | 50 | 50 |
Bandwidth IR1 -> IR2 | 1200 | 1200 | 1200 | 1200 |
Best Effort Load (S1) | 100% | 90% | 150% | 67% |
Total load for link IR1->IR2| 150% | 140% | 200% | 117% |
In situation I, there are no unused resources left for the B1 and B2
flows. In situation II, there is a residual bandwidth of 10% of the
bottleneck link between IR1 and IR2. In situation III, the traffic
load of A1-A5 is 50% higher than the bottleneck link capacity. In
situation IV, A1-A5 consume only 2/3 of the bottleneck link capacity.
B1 and B2 require together 50% of the bottleneck link capacity.
The simulations were performed with the freely available discrete
event simulation tool OMNeT++ and a suitable set of QoS mechanisms
[<a href="#ref-SimKIDS" title=""A simulation suite for Internet nodes with the ability to integrate arbitrary Quality of Service behavior"">SimKIDS</a>]. Results from the different simulation scenarios are
discussed in the next section.
<span class="h3"><a class="selflink" id="appendix-A.2" href="#appendix-A.2">A.2</a>. Simulation Results</span>
QoS parameters listed in the following tables are averaged over the
first 160s of the transmission. Results of situation I are shown in
Figure 2. When the BE PDB is used for transmission of bulk flows B1
and B2 in case B), one can see that flows A1-A5 throttle their
sending rate to allow transmission of bulk flows B1 and B2. In case
C1), not a single packet is transmitted to the receiver because all
packets get dropped within IR1, thereby protecting Ax flows from Bx
flows. In case C2), B1 and B2 consume all resources up to the
configured limit of 10% of the link bandwidth, but not more. C3)
also limits the share of B1 and B2 flows, but not as precisely as
with WFQ. C4) shows slightly higher packet losses for Ax flows due
to the active queue management.
<span class="grey">Bless, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
+-------------------------+--------+-----------------------------------+
| | | Bulk Transfer with PDB: |
| QoS Parameter | A) | B) | C) Lower Effort |
| |No bulk | Best | 1) 2) 3) 4) |
| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ|
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 240 | 71 | 240 | 214 | 225 | 219 |
| | A2 | 240 | 137 | 240 | 216 | 223 | 218 |
| | A3 | 240 | 209 | 240 | 224 | 220 | 217 |
| Throughput | A4 | 239 | 182 | 239 | 222 | 215 | 215 |
| [kbit/s] | A5 | 238 | 70 | 238 | 202 | 201 | 208 |
| | B1 | - | 491 | 0 | 82 | 85 | 84 |
| | B2 | - | 40 | 0 | 39 | 31 | 38 |
+----------------+--------+--------+------+------+------+------+-------+
|Total Throughput| normal | 1197 | 669 | 1197 | 1078 | 1084 | 1078 |
| [kbit/s] | bulk | - | 531 | 0 | 122 | 116 | 122 |
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 0 | 19.3 | 0 | 6.3 | 5.7 | 8.6 |
| | A2 | 0 | 17.5 | 0 | 6.0 | 5.9 | 8.9 |
| | A3 | 0 | 10.2 | 0 | 3.2 | 6.2 | 9.1 |
| Paket Loss | A4 | 0 | 12.5 | 0 | 4.5 | 6.6 | 9.3 |
| [%] | A5 | 0 | 22.0 | 0 | 6.0 | 5.9 | 9.0 |
| | B1 | - | 10.5 | 100 | 33.6 | 38.4 | 33.0 |
| | B2 | - | 19.6 | 100 | 19.9 | 37.7 | 22.2 |
+----------------+--------+--------+------+------+------+------+-------+
| Total Packet | normal | 0 | 14.9 | 0 | 5.2 | 6.1 | 9.0 |
| Loss Rate [%] | bulk | 0 | 11.4 | 100 | 29.5 | 38.2 | 29.7 |
+----------------+--------+--------+------+------+------+------+-------+
| Transmitted | | | | | | | |
| Data [MByte] | normal | 21.9 | 12.6 | 21.9 | 19.6 | 20.3 | 20.3 |
+----------------+--------+--------+------+------+------+------+-------+
Figure 2: Situation I - Best Effort traffic uses 100% of the
available bandwidth
<span class="grey">Bless, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Results of situation II are shown in Figure 3. In case C1), LE
traffic gets exactly the 10% residual bandwidth that is not used by
the Ax flows. Cases C2) and C4) show similar results compared to
C1), whereas case C3) also drops packets from flows A1-A5 due to
active queue management.
+-------------------------+--------+-----------------------------------+
| | | Bulk Transfer with PDB: |
| QoS Parameter | A) | B) | C) Lower Effort |
| |No bulk | Best | 1) 2) 3) 4) |
| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ|
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 216 | 193 | 216 | 216 | 211 | 216 |
| | A2 | 216 | 171 | 216 | 216 | 211 | 216 |
| | A3 | 216 | 86 | 216 | 216 | 210 | 216 |
| Throughput | A4 | 215 | 121 | 215 | 215 | 211 | 215 |
| [kbit/s] | A5 | 215 | 101 | 215 | 215 | 210 | 215 |
| | B1 | - | 488 | 83 | 83 | 114 | 84 |
| | B2 | - | 39 | 39 | 39 | 33 | 38 |
+----------------+--------+--------+------+------+------+------+-------+
|Total Throughput| normal | 1078 | 672 | 1077 | 1077 | 1053 | 1077 |
| [kbit/s] | bulk | - | 528 | 122 | 122 | 147 | 122 |
+----------------+--------+--------+------+------+------+----+-+-------+
| | A1 | 0 | 9.4 | 0 | 0 | 1.8 | 0 |
| | A2 | 0 | 14.6 | 0 | 0 | 2.0 | 0 |
| | A3 | 0 | 22.4 | 0 | 0 | 2.1 | 0 |
| Paket Loss | A4 | 0 | 15.5 | 0 | 0 | 1.8 | 0 |
| [%] | A5 | 0 | 17.4 | 0 | 0 | 1.9 | 0 |
| | B1 | - | 11.0 | 32.4 | 32.9 | 35.7 | 33.1 |
| | B2 | - | 21.1 | 20.3 | 20.7 | 34.0 | 22.2 |
+----------------+--------+--------+------+------+------+------+-------+
| Total Packet | normal | 0 | 14.9 | 0 | 0 | 1.9 | 0 |
| Loss Rate [%] | bulk | - | 12.0 | 28.7 | 29.1 | 35.3 | 29.8 |
+----------------+--------+--------+------+------+------+------+-------+
| Transmitted | | | | | | | |
| Data [MByte] | normal | 19.8 | 12.8 | 19.8 | 19.8 | 19.5 | 19.8 |
+----------------+--------+--------+------+------+------+------+-------+
Figure 3: Situation II - Best Effort traffic uses 90% of the
available bandwidth
<span class="grey">Bless, et al. Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Results of simulations for situation III are depicted in Figure 4.
Due to overload caused by flows A1-A5, packets get dropped in all
cases. Bulk flows B1 and B2 nearly get their maximum throughput in
case B). As one would expect, in case C1) all packets from B1 and B2
are dropped, in cases C2) and C4) resource consumption of bulk data
is limited to the configured share of 10%. Again the WRED
implementation in C3) is not as accurate as the WFQ variants and lets
more BE traffic pass through IR1.
+-------------------------+--------+-----------------------------------+
| | | Bulk Transfer with PDB: |
| QoS Parameter | A) | B) | C) Lower Effort |
| |No bulk | Best | 1) 2) 3) 4) |
| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ|
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 303 | 136 | 241 | 298 | 244 | 276 |
| | A2 | 316 | 234 | 286 | 299 | 240 | 219 |
| | A3 | 251 | 140 | 287 | 259 | 236 | 225 |
| Throughput | A4 | 168 | 84 | 252 | 123 | 209 | 219 |
| [kbit/s] | A5 | 159 | 82 | 132 | 101 | 166 | 141 |
| | B1 | - | 483 | 0 | 83 | 73 | 83 |
| | B2 | - | 41 | 0 | 38 | 31 | 38 |
+----------------+--------+--------+------+------+------+------+-------+
|Total Throughput| normal | 1199 | 676 | 1199 | 1079 | 1096 | 1079 |
| [kbit/s] | bulk | - | 524 | 0 | 121 | 104 | 121 |
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 9.6 | 17.6 | 12.1 | 9.3 | 8.6 | 12.8 |
| | A2 | 8.5 | 13.6 | 8.4 | 9.8 | 8.1 | 14.5 |
| | A3 | 8.8 | 18.7 | 7.7 | 11.6 | 7.8 | 13.6 |
| Paket Loss | A4 | 14.9 | 22.3 | 11.2 | 18.9 | 8.2 | 12.4 |
| [%] | A5 | 12.8 | 19.0 | 15.6 | 19.7 | 8.3 | 14.3 |
| | B1 | - | 11.9 | 100 | 32.1 | 39.5 | 33.0 |
| | B2 | - | 17.3 | 100 | 22.5 | 37.7 | 22.8 |
+----------------+--------+--------+------+------+------+------+-------+
| Total Packet | normal | 10.4 | 17.3 | 10.3 | 12.2 | 8.2 | 13.4 |
| Loss Rate [%] | bulk | - | 12.4 | 100 | 29.1 | 39.0 | 29.9 |
+----------------+--------+--------+------+------+------+------+-------+
| Transmitted | | | | | | | |
| Data [MByte] | normal | 22.0 | 12.6 | 22.0 | 20.2 | 20.6 | 20.3 |
+----------------+--------+--------+------+------+------+------+-------+
Figure 4: Situation III - Best Effort traffic load is 150%
<span class="grey">Bless, et al. Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
In situation IV, 33% or 400 kbit/s are not used by Ax flows and the
results are listed in Figure 5. In case B) where bulk data flows B1
and B2 use the BE PDB, packets of Ax flows are dropped, whereas in
cases C1)-C4) flows Ax are protected from bulk flows B1 and B2.
Therefore, by using the LE PDB for Bx flows, the latter get only the
residual bandwidth of 400 kbit/s but not more. Packets of Ax flows
are not affected by Bx traffic in these cases.
+-------------------------+--------+-----------------------------------+
| | | Bulk Transfer with PDB: |
| QoS Parameter | A) | B) | C) Lower Effort |
| |No bulk | Best | 1) 2) 3) 4) |
| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ|
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 160 | 140 | 160 | 160 | 160 | 160 |
| | A2 | 160 | 124 | 160 | 160 | 160 | 160 |
| | A3 | 160 | 112 | 160 | 160 | 160 | 160 |
| Throughput | A4 | 160 | 137 | 160 | 160 | 159 | 160 |
| [kbit/s] | A5 | 159 | 135 | 159 | 159 | 159 | 159 |
| | B1 | - | 509 | 361 | 362 | 364 | 362 |
| | B2 | - | 43 | 40 | 39 | 38 | 40 |
+----------------+--------+--------+------+------+------+------+-------+
|Total Throughput| normal | 798 | 648 | 798 | 798 | 797 | 798 |
| [kbit/s] | bulk | - | 551 | 401 | 401 | 402 | 401 |
+----------------+--------+--------+------+------+------+------+-------+
| | A1 | 0 | 9.2 | 0 | 0 | 0 | 0 |
| | A2 | 0 | 12.2 | 0 | 0 | 0 | 0 |
| | A3 | 0 | 14.0 | 0 | 0 | 0 | 0 |
| Paket Loss | A4 | 0 | 9.3 | 0 | 0 | 0 | 0 |
| [%] | A5 | 0 | 6.6 | 0 | 0 | 0 | 0 |
| | B1 | - | 7.3 | 21.2 | 21.8 | 25.0 | 21.3 |
| | B2 | - | 14.3 | 19.4 | 20.7 | 24.5 | 20.7 |
+----------------+--------+--------+------+------+------+------+-------+
| Total Packet | normal | 0 | 10.2 | 0 | 0 | 0 | 0 |
| Loss Rate [%] | bulk | - | 8.0 | 21.0 | 21.7 | 25.0 | 21.2 |
+----------------+--------+--------+------+------+------+------+-------+
| Transmitted | | | | | | | |
| Data [MByte] | normal | 14.8 | 12.1 | 14.8 | 14.8 | 14.7 | 14.7 |
+----------------+--------+--------+------+------+------+------+-------+
Figure 5: Situation IV - Best Effort traffic load is 67%
In summary, all the different scenarios show that the "normal" BE
traffic can be protected from traffic in the LE PDB effectively.
Either no packets get through if no residual bandwidth is left (LE
traffic is starved), or traffic of the LE PDB can only consume
resources up to a configurable limit.
<span class="grey">Bless, et al. Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Furthermore, the results substantiate that mass data transfer can
adversely affect "normal" BE traffic (e.g., 14.9% packet loss in
situations I and II, even 10.2% in situation IV) in situations
without using the LE PDB.
Thus, while all presented variants of realizing the LE PDB meet the
desired behavior of protecting BE traffic, they also show small
differences in detail. A network operator has the opportunity to
choose a realization method to fit the desired behavior (showing this
is - after the proof of LE's efficacy - the second designation of
this appendix). For instance, if operators want to starve LE traffic
completely in times of congestion, they could choose PQ. This causes
LE traffic to be completely starved and not a single packet would get
through in case of full load or overload.
On the other hand, for network operators who want to permit some
small amount of throughput in the LE PDB, one of the other variants
would be a better choice.
Referring to this, the WFQ implementation showed a slightly more
robust behavior with PQ, but had problems with synchronized TCP
flows. WRED behavior is highly dependent on the actual traffic
characteristics and packet loss rates are often higher compared to
other implementations, while the fairness between TCP connections is
better. The combined solution of WFQ with RED showed the overall
best behavior, when an operator's intent is to keep a small but
noticeable throughput in the LE PDB.
<span class="grey">Bless, et al. Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Normative References
[<a id="ref-RFC3086">RFC3086</a>] Nichols, K. and B. Carpenter, "Definition of
Differentiated Services Per Domain Behaviors and Rules for
their Specification", <a href="./rfc3086">RFC 3086</a>, April 2001.
[<a id="ref-RFC2474">RFC2474</a>] Nichols, K., Blake, S., Baker, F. and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", <a href="./rfc2474">RFC 2474</a>, December
1998.
[<a id="ref-RFC2475">RFC2475</a>] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z.
and W. Weiss, "An Architecture for Differentiated
Services", <a href="./rfc2475">RFC 2475</a>, December 1998.
Informative References
[<a id="ref-RFC2597">RFC2597</a>] Heinanen, J., Baker, F., Weiss, W. and J. Wroclawski,
"Assured Forwarding PHB Group", <a href="./rfc2597">RFC 2597</a>, June 1999.
[<a id="ref-CBQ">CBQ</a>] Floyd, S. and V. Jacobson, "Link-sharing and Resource
Management Models for Packet Networks", IEEE/ACM
Transactions on Networking, Vol. 3, No. 4, pp. 365-386,
August 1995.
[<a id="ref-LBE">LBE</a>] Bless, R. and K. Wehrle, "A Lower Than Best-Effort Per-Hop
Behavior", Work in Progress, September 1999.
[<a id="ref-LE">LE</a>] Bless, R. and K. Wehrle, "A Limited Effort Per-Hop
Behavior", Work in Progress, February 2001.
[<a id="ref-SimKIDS">SimKIDS</a>] Wehrle, K., Reber, J. and V. Kahmann, "A simulation suite
for Internet nodes with the ability to integrate arbitrary
Quality of Service behavior", in Proceedings of
Communication Networks And Distributed Systems Modeling
And Simulation Conference (CNDS 2001), Phoenix (AZ), USA,
pp. 115-122, January 2001.
[<a id="ref-NRS">NRS</a>] Bless, R. and K. Wehrle, "Group Communication in
Differentiated Services Networks", in Proceedings of IEEE
International Workshop on "Internet QoS", Brisbane,
Australia, IEEE Press, pp. 618-625, May 2001.
<span class="grey">Bless, et al. Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Authors' Addresses
Roland Bless
Institute of Telematics, Universitaet Karlsruhe (TH)
Zirkel 2
76128 Karlsruhe
Germany
EMail: bless@tm.uka.de
URI: <a href="http://www.tm.uka.de/~bless/">http://www.tm.uka.de/~bless/</a>
Kathleen Nichols
325M Sharon Park Drive #214
Menlo Park, CA 94025
EMail: knichols@ieee.org
Klaus Wehrle
University of Tuebingen, Computer Networks and Internet
Morgenstelle 10c, 72076 Tuebingen, Germany &
International Computer Science Institute (ICSI)
1947 Center Street, Berkeley, CA, 94704, USA
EMail: Klaus.Wehrle@uni-tuebingen.de
URI: <a href="http://net.informatik.uni-tuebingen.de/~wehrle/">http://net.informatik.uni-tuebingen.de/~wehrle/</a>
<span class="grey">Bless, et al. Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc3662">RFC 3662</a> Lower Effort PDB December 2003</span>
Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assignees.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Bless, et al. Informational [Page 17]
</pre>
|