* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Proposed Differentiated Services on the Internet
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Net neutrality wikipedia , lookup
Network tap wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
Distributed firewall wikipedia , lookup
Internet protocol suite wikipedia , lookup
Computer network wikipedia , lookup
Net neutrality law wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Packet switching wikipedia , lookup
Deep packet inspection wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Proposed Differentiated Services on the Internet By Dr. Junaid A. Zubairi Department of Math and Computer Science SUNY at Fredonia Overview of Presentation The Evolution of Internet The Types of Traffic on the Internet Performance Issues in Packet Switching The World Wide Web Changing Traffic on the Internet The Birth and Death(?) of ATM!! IETF’s DiffServ Model MPLS The Evolution of Internet DARPA (Defense Advanced Projects Research Agency) started the ARPAnet in 1969 between four nodes The Internet was primarily used for connecting academic campuses together until the mid 80’s Academicians used the Internet for sharing ideas and research results via email and ftp The Evolution of Internet Internet was primarily used for email, usenet, file transfer and remote usage of machines With email, users were able to keep in touch With usenet, users were able to discuss topics of interest in focussed newsgroups With file transfer, users could download and upload articles, programs and images With telnet, a user could login to his or her UNIX account from anywhere Types of Traffic on the Internet Email, usenet, ftp and telnet were applications that generated almost similar type of traffic stream on the Internet This traffic required “reliability”. The protocols were expected to deliver all the data no matter how long it took With high error rate, the elapsed time simply increased but the transmissions were completed Performance Issues in Packet Switching For transmission on the Internet, the TCP/IP suite of protocols breaks the data into datagrams or packets and routes each packet through an independently selected path Packets may arrive at the destination out of sequence but due to buffering and reordering, the actual data can be recovered easily Performance Issues in Packet Switching Path selection criterion is usually shortest path first If the shortest path is congested or unreliable, the router can choose another path All routers decide independently and it is a distributed environment Traditional TCP/IP based traffic is bursty and it can increase or decrease abruptly Performance Issues in Packet Switching Given this scenario, a router may find itself overwhelmed with a lot more packets than it can handle Routers have limited buffering space in which a queue of packets is managed (Refer to Figure on next slide ) Usually routers would use simple FIFO scheme to select the next packet to be transmitted Adapted for academic use from OPNET Modeler Tutorial Performance Issues in Packet Switching If the queue is full, the newly arrived packets must be dropped (or discarded) Thus increase in traffic may increase timeouts, retransmissions and decrease in efficiency To sum it up, the traditional TCP/IP network based on packet switching is a “best effort” network Performance Issues in Packet Switching The packet switching network makes its best effort to deliver the data however it makes no guarantees or promises to the user about the network performance What is meant by network performance? Network performance is “Throughput” Throughput could be defined as the aggregate rate of transmission offered by the network to the user The World Wide Web The introduction of hypertext marking language (HTML) in early 1990 has revolutionized the Internet HTML and its associated protocol HTTP have transformed the Internet into a useroriented information repository HTML has also made it very easy to “publish” information online even for users with very little computer expertise The World Wide Web The open ended HTTP has resulted in supporting the linking of various types of data into the web published documents HTTP makes it possible for web sites to offer binary files, images, and multimedia documents to the users with the click of a button HTTP has also resulted in making the Internet very popular. Internet continues to expand in number of websites and the number of users The World Wide Web Web deployment is flexible and easy Due to the web technologies, the Internet has been put to use in almost all areas of human knowledge For example, water distribution monitoring, real-time traffic maps of big cities, free long distance calling, distance learning with lecture videos, buying and selling shares, online shopping etc., the list appears endless The Changing Traffic on the Internet Due to the web enabled applications on the Internet, there has been a tremendous change in the types of traffic Now we have to deal with a significant amount of traffic that is time-sensitive For example, consider the case of an audio based application that needs to transmit the data across the Internet The Changing Traffic on the Internet Adapted for Academic Use from "Computer Networks: A Systems The Changing Traffic on the Internet Adapted for Academic Use from "Computer Networks: A Systems The Birth and Death(?) of ATM!! In this scenario, ATM offered a great promise to the users ATM (Asynchronous Transfer Mode) is a cell-switching technology that was targeted to become the B-ISDN (Broad ISDN) network of the future ATM was developed with the right targets and it offered the much awaited performance assurance The Birth and Death(?) of ATM!! ATM is a connection-oriented technology that offers various categories of services (performance promises) to the users Service categories include • • • • • CBR (Constant Bit Rate such as telephony) RT-VBR (real-time video such as videoconference) NRT-VBR (Non real-time video e.g. stored video) ABR (Available BR such as web browsing) UBR (Unspecified BR such as ftp) The Birth and Death(?) of ATM!! If a user requests a certain service, ATM uses CAC (Connection Admission Control) to determine if granting this request would not jeopardize existing contracts User and network agree on certain QoS parameters such as PCR (Peak Cell Rate), SCR (Sustained Cell Rate) and CDV (Cell Delay Variation) etc. The Birth and Death(?) of ATM!! In order to meet the QoS contract obligations, ATM network enforces traffic shaping and policing Shaping involves techniques such as “Leaky Bucket Algorithm” to regulate bursty traffic Policing means marking CLP (Cell Loss Priority) on the offending cells that violate the maximum rates agreed Leaky Bucket Algorithm Adapted for academic use from "Computer Networks" Tanenbaum The Birth and Death(?) of ATM!! However, the evolution of shared Ethernet into switched Ethernet at 10Mbps and development of Fast Ethernet at 100Mbps stalled the ATM’s march to the desktop ATM was pushed back to the backbones of campus networks Gigabit Ethernet in the backbone appears to be the last nail in the coffin for ATM The Birth and Death(?) of ATM!! ATM failed because of several factors ATM is too complex (From packets to cells to SONET frames, using AAL’s, emulating LAN) ATM is expensive Ethernet has evolved into much faster 100Mbps and 1000Mbps services All popular and established network applications are packet based IETF’s Models It was felt that instead of focussing on coping with congestion, Internet should be run in a way that there is no congestion Applications should be able to reserve network resources at a given QoS IETF has been working on developing new models and protocols for the Internet and private networks IETF’s Models IntServ and RSVP provide quantitative guarantees to each flow. RSVP requires all intermediate routers to keep track of each and every flow through “soft state”. RSVP flows involve signaling and soft state overhead and RSVP does not scale well to the Internet. It may be successfully deployed in a campus network IETF’s DiffServ Model IETF is developing a model to provide differing levels of service to different applications without the overhead of signaling and state maintenance The DiffServ model uses the TOS field in IPv4 header to affix labels on packets belonging to different service levels DiffServ has the potential to offer QoS on the Internet, at last!! IETF’s DiffServ Model Consider a gas station, you can buy regular, super or premium gas from the same pump DiffServ offers various service levels to the customer from the same network with SLA DiffServ adopts techniques used in ATM for traffic management, in a simplified way DiffServ treats the network and the customer in the way the ATM does.i.e. Customer gets a link at the specified level of service to the network. IETF’s DiffServ Model DiffServ levels of service are implemented in a DiffServ domain The customer connects to the “edge router” at the edge of the DiffServ domain The edge router performs traffic classification (using DS codepoint marked by customer in TOS to separate the packets) It then measures submitted traffic for conformance to the agreed profile IETF’s DiffServ Model The edge router then changes the DS code byte of offending packets It may also do traffic shaping by delaying the packets as necessary and dropping the offending packets Refer to the diagram in the next slide to see the edge router function Adapted for Academic Use from "Data and Computer IETF’s DiffServ Model IETF has defined two DS services that are visible as PHB (per-hop-behavior) of an intermediate router for the marked packet EF (Expedited Forwarding) EF is the premium service offered. It can appear as a virtual leased line for the customer. It offers low loss/latency and assured bandwidth http://www.ietf.org/rfc/rfc2598.txt IETF’s DiffServ Model AF (Assured Forwarding) The AF PHB group provides delivery of IP packets in four independently forwarded AF classes. Within each AF class, an IP packet can be assigned one of three different levels of drop precedence. A DS node does not reorder IP packets of the same microflow if they belong to the same AF class. http://www.ietf.org/rfc/rfc2597.txt MPLS MPLS (Multi Protocol Label Switching) is the most promising protocol for the Internet An MPLS domain has an ingress node that nails down paths through the maze of core routers for every requesting flow until the exit door (egress node) Thus every router does not have to decide about the path of each packet MPLS Intermediate routers use a “shim header” or a layer 2.5 header to decide about the next hop of a packet This shim header is inserted between the frame header and packet header It is used by the router to consult a table that tells what path is good for this packet This shim header is the “Label” and the whole thing is called “Label Switching” MPLS Instead of routing, now the routers do label switching Since the path is pre-determined, routers can speed up the processing of packets Also, the management can decide LSP’s (label switched paths) based on load distribution and other administrative goals Thus the connectionless network changes into a connection oriented network Summary Thus we can see that the Internet is changing in a major way MPLS and Diffserv are being combined to provide EF paths to certain flows such as IP telephony, AF paths to multimedia streaming and DF paths to ftp, email etc In future, Internet may be able to provide the QoS that is only enjoyed by telephone and Radio/TV broadcasting