* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Diffserv
Asynchronous Transfer Mode wikipedia , lookup
Distributed operating system wikipedia , lookup
Backpressure routing wikipedia , lookup
Distributed firewall wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Deep packet inspection wikipedia , lookup
Peer-to-peer wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Airborne Networking wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
IETF Differentiated Services
Concerns with Intserv:
Scalability: signaling, maintaining per-flow router
state difficult with large number of flows
Flexible Service Models: Intserv has only two
classes. Also want “qualitative” service classes
“behaves like a wire”
relative service distinction: Platinum, Gold, Silver
Diffserv approach:
simple functions in network core, relatively
complex functions at edge routers (or hosts)
Don’t define define service classes, provide
functional components to build service classes
Differentiated Services
Intended to address the following difficulties
with Intserv and RSVP;
Scalability: maintaining states by routers in high
speed networks is difficult sue to the very large
number of flows
Flexible Service Models: Intserv has only two
classes, want to provide more qualitative service
classes; want to provide ‘relative’ service
distinction (Platinum, Gold, Silver, …)
Simpler signaling: (than RSVP) many applications
and users may only w ant to specify a more
qualitative notion of service
Diffserv Architecture
Edge router:
r
- per-flow traffic management
- marks packets as in-profile
and out-profile
Core router:
- per class traffic management
- buffering and scheduling
based on marking at edge
- preference given to in-profile
packets
- Assured Forwarding
b
marking
scheduling
..
.
Edge Functions
At DS-capable host or first DS-capable router
Classification: edge node marks packets according
to classification rules to be specified (manually by
admin, or by some TBD protocol)
Traffic Conditioning: edge node may delay and
then forward or may discard
Edge-router Packet Marking
profile: pre-negotiated rate A, bucket size B
packet marking at edge based on per-flow profile
Rate A
B
User packets
Possible usage of marking:
class-based marking: packets of different classes marked differently
intra-class marking: conforming portion of flow marked differently than
non-conforming one
Classification and Conditioning
Packet is marked in the Type of Service (TOS) in
IPv4, and Traffic Class in IPv6
6 bits used for Differentiated Service Code Point
(DSCP) and determine PHB that the packet will
receive
2 bits are currently unused
Classification and Conditioning
may be desirable to limit traffic injection rate of
some class:
user declares traffic profile (eg, rate, burst size)
traffic metered, shaped if non-conforming
Forwarding (PHB)
PHB result in a different observable (measurable)
forwarding performance behavior
PHB does not specify what mechanisms to use to
ensure required PHB performance behavior
Examples:
Class A gets x% of outgoing link bandwidth over time
intervals of a specified length
Class A packets leave first before packets from class B
Forwarding (PHB)
PHBs being developed:
Expedited Forwarding: pkt departure rate of a
class equals or exceeds specified rate
logical link with a minimum guaranteed rate
Assured Forwarding: 4 classes of traffic
each guaranteed minimum amount of bandwidth
each with three drop preference partitions
Diffserv and MPLS
Both are WAN QoS mechanisms. While Diffserv is
used for traffic aggregation and provisioning of
differentiated services, MPLS is mainly used for
traffic aggregation and load balancing.
MPLS
Originally introduced as a WAN mechanism for
forwarding packets using label switching instead
of the IP address-based routing and provide
differentiated QoS.
It has found its most use in Traffic Engineering
(TE)
TE requires that traffic follows specific, possibly
nonoptimal, routes to enable diverse routing, traffic load
balancing, and other means of optimizing network
resources.
MPLS forces traffic into these routes or Label
Switched Paths (LSPs).
Routers or LSRs
In the MPLS network, routers are called label
switching routers (LSR).
Edge LSRs (also called LERs) provide the interface
between the external IP network and the LSP.
Core LSRs provide transit services through the MPLS
cloud using the pre-established LSP.
In a SP network, on the ingress the Edge LSR accepts IP
packets and appends MPLS labels.
On the egress, an edge LSR terminates the LSP by
removing MPLS labels and resorting to the normal IP
forwarding.
FEC
The forward equivalence class (FEC) is a
representation of a group of packets that share
the same requirements for their transport. All
packets in such a group are provided the same
treatment en route to the destination.
Each LSR builds a table to specify how a packet
must be forwarded. The table, label information
base (LIB) comprises of FEC-to-label bindings.
Labels and Label Bindings
A label identifies the path a packet should
traverse
It is encapsulated in a layer-2 header of the
packet -- special MPLS header (aka shim) includes
a label, an experimental field (Exp), an indicator of
additional labels(S), and Time to live (TTL).
Receiving router uses the label content to
determine the next hop.
Label values are of local significance only
pertaining to hops between LSRs.
Labels are bound to an FEC asa result of some
event or policy
Label Assignment
Based on forwarding criteria such as
destination unicast routing
traffic engineering
multicast
virtual private network
QoS
MPLS Signaling
A signaling protocol performs a variety of
functions such as:
setting up LSPs traversing specified sequences of LSRs
derived from the constraint-based routing (CR) analysis;
create the path state in each LSR by performing label
allocation, distribution, and binding;
reserve resources in each LSR including bandwidth,
delay, and packet loss bounds;
eassign the network resources as necessary;
dynamically reroute during network congestion and
failures;
monitor and maintain explicitly routed LSP state
CR-LDP
CR-LDP: LDP using constraint-based routing
LDP provides a common understanding between LSR
peers of the meaning of labels used to forward traffic
between them
Message categories:
• Discovery -- sent periodically by LSRs to announce their
presence
• Session -- to establish, maintain, and terminate a session
between two LDP peers
• Advertisement -- to create, change, and delete label
mappings to FECs after a session has been established
• Notification -- to signal and provide advisory info.
Forward path, hard state with no state refreshes
RSVP-TE
Signals between LSRs
Creates a state for a collection of flows between
the ingress and egress points of a traffic trunk
An LSP aggregates multiple host-to-host flows and
thus reduces the amount of RSVP states in the
network
Uses firm state where Path and Resv messages are
periodically refreshed but their volume is
significantly reduced
QoS Routing
As defined in RFC 2386, QoS “is a set of service
requirements to be met by the network while transporting a
flow.” A flow is “a packet stream from source to a
destination with an associated QoS.”
Measurable level of service delivered to network users
which can be characterized by packet loss probability,
available bandwidth, end-to-end delay, etc. Expressed as a
Service Level Agreement(SLA) between network users and
service providers.
QoS-based routing is defined as “a routing mechanism under
which paths for flows are determined based on some
knowledge of resource availability in the network as well as
the QoS requirement of the flows.” A dynamic routing
scheme with QoS considerations.
QoS Metrics
Bandwidth, delay, jitter, cost, loss probability
three types of metrics: additive, multiplicative,
concave
Let m(n1,n2) be a metric for link(n1, n2). For any
path P = (n1, n2, .., ni, nj), metrci m is:
additive, if m(P) = m(n1,n2) + m(n2,n3) +…..+ m(ni,nj)
(examples are dealy, jitter, cost, hop-count)
multiplicative, if m(P) = m(n1,n2) * m(n2,n3) *…* m(ni,nj)
(example is reliability, in which case 0<=m(ni,nj)<=1)
concave, if m(P) = min{m(n1,n2), m(n2,n3), …, m(ni,nj)}
(example is bandwidth meaning that the bandwidth of the
path as a whole is determined by the link with the
minimum available bandwidth)
Objectives
To meet QoS requirements of end users.
To optimize network resource usage
to gracefully degrade network performance under
heavy load
Design Issues(1)
IP routing protocols such as OSPF, RIP, and BGP
are called “best-effort” routing protocols. They
use only the shortest path to the destination -single objective optimization algorithms which
consider only one metric (like hop-count).
Much more difficult to design and implement than
Best-effort routing. Many tradeoffs have to be
made. In most cases the goal is not to find the
best solution but to find a viable solution with
acceptable cost.
Design Issues(2)
Metrics and path computation
how do we measure and collect network state
information?
how do we compute routes based on the information
collected?
Mapping of QoS requirements to well defined QoS
Metrics
Computation complexity associated with path
computation (much of QoS routing based on
multiple constraint optimization is NP-complete).
Many heuristic algorithms exist.
Design Issues (3)
Path computation is followed by resource
reservation which means that when the path is
chosen the network state in terms of available
resources is changed and such information needs
to propagated throughout the network.
Knowledge propagation and Maintenance
how often the routing information is exchanged between
the routers?
The tradeoff here is between information accuracy and
efficiency.
For instance, what is available bandwidth? Is it what is
left after reservation or the actual physically available?
How do we maintain the info collected?(on demand path
computation, aggregation, routing tables?)
Design Issues (4)
Scaling by hierarchical aggregation
Imprecise state information model. Sources of
inaccuracy:
network dynamics
aggregation of routing information
hidden information
approximate calculation
Administrative control -- flow priorities and
preemption, resource control and fairness
Integrate QoS-based routing and Best-effort
routing
Intra-domain Vs. Inter-domain
Dynamic path computation to statically provisioned
paths for a few service classes for intra-domain
Some common features for intra-domain:
admission control, optimal resource usage, failure
notices, support for best-effort flows, support for
multicast routing with receiver heterogeneity and shared
reservation styles
Inter-domain routing scheme have to be scalable
and therefore, simple.
Cannot be based on highly dynamic network state info
info exchange between domains should be relatively
static
Routing Strategies
Source routing
distributed routing
hierarchical routing
they are classified based on the way the state
information is maintained and the search foe
feasible path is carried out
Source Routing
Each node maintains the complete global state,
including the network topology and the state
information of every link
Based on the global state, a feasible path is locally
computed at the source node
A control message is sent out along the selected
path to inform the intermediate nodes of their
precedent and successive nodes
A link state protocol is used to update the global
state at every node
Source Routing (2)
Strengths: simplicity through centralization;
avoids many of the distributed computing
problems; guarantees loop-free routes;
conceptually simple, easy to implement, evaluate,
debug and upgrade; centralized heuristics are
much easier to design for some NP-complete
routing problems.
Weaknesses: communication overhead to maintain
global state; imprecision global state info; high
computation overhead at the source; In short,
source routing has scalability problem.
Distributed Routing
Path is computed by a distributed computation
Control messages are exchanged among nodes and
state information kept at each node is collectively
used for path search
Requires a distance-vector protocol or link-state
protocol to maintain a global state in the form of
distance vectors at every node. Based on the
distance vectors, the routing is done on a hop-byhop basis.
Distributed Routing (2)
Strengths: path computation is distributed and
result in shorter routing response time; scalable;
searching multiple paths in parallel for a feasible
path; routing decision and optimization is done
entirely based on local states;
Weaknesses: dependence on global state; flooding
based algorithms which do not maintain global
state have higher communication overheads;
difficult to design efficient heuristics in the
absence of detailed topology or link-state info;
presence of loops due to inaccurate global state
info at individual nodes (easily detected but
alternate paths are difficult to find)
Hierarchical Routing
Nodes are clustered into groups which may be
clustered into higher level groups recursively
creating a multi-level hierarchy.
Each physical node maintains an aggregated global
state -- contains the detailed state info about the
nodes in the same group and aggregated state info
about other groups.
Source routing is used to find a feasible path.
A control message is sent along this path to
establish the connection. A border node in a group
represented by a logical node receives the
message and uses source routing to extend the
path through the group.
Hierarchical Routing (2)
Strengths: Scales well; retains many advantages
of source routing as well as distributed routing.
Weaknesses: aggregated network state introduces
additional imprecision; gets more complicated
when multiple QoS constraints are involved.