31
An Architecture for Differentiated Services RFC 2475

An Architecture for Differentiated Services

Embed Size (px)

DESCRIPTION

An Architecture for Differentiated Services. RFC 2475. Introduction. Diffserv architecture is to implement scalable service in the Internet A Service defines some significant characteristics of packet transmission such as : throughput, delay, jitter, loss - PowerPoint PPT Presentation

Citation preview

Page 1: An Architecture for Differentiated Services

An Architecture for Differentiated Services

RFC 2475

Page 2: An Architecture for Differentiated Services

Introduction

Diffserv architecture is to implement scalable service in the InternetA Service defines some significant characteristics of packet transmission such as : throughput, delay, jitter, loss

Service differentiation is desired to accommodate heterogeneous app. requirements and user expectations

Page 3: An Architecture for Differentiated Services

IntroductionDiffserv architecture is compose of a number of functional elements implemented in network nodes: A small set of per-hop forwarding behavior Packet classification functions Traffic conditioning functions

Complex classification and conditioning functions are only at boundary nodes achieves scalability

Page 4: An Architecture for Differentiated Services

Requirements

Accommodate a wide variety of services and provisioning policiesAllow decoupling of the service form the particular app. in useWork with existing app. without the need for the changes of the app.Decouple traffic conditioning and service provisioning functions form forwarding behaviors within core nodes

Page 5: An Architecture for Differentiated Services

RequirementsShould not depend on hop-by-hop app. signalingRequire only a small set of forwarding behaviorsAvoid per-microflow or per-customer state within core network nodesUtilize only aggregated classification state within core network nodes

Page 6: An Architecture for Differentiated Services

Requirements

Permit simple packet classification implementations in core network nodesPermit reasonable interoperability with non-DS-compliant network nodesAccommodate incremental deployment

Page 7: An Architecture for Differentiated Services

Diffserv Architectural Model

The simple model is: Traffic entering a network is classified

and possibly conditioned at the boundaries of the network, and assigned to different behavior aggregates

Behavior aggregate is identified by a single DS codepointPackets are forwarded according to the per-hop behavior associated with the DS codepoint in the core network

Page 8: An Architecture for Differentiated Services

Diffserv Domain

DS boundary nodes classify and possibly condition ingress

traffic

DS interior nodes Select the forwarding behavior for

packets based on their DS codepoint

Page 9: An Architecture for Differentiated Services

Diffserv Domain

Page 10: An Architecture for Differentiated Services

Ingress and Egress nodes

DS boundary nodes act both as a DS ingress node and as a DS egress node for different directions of trafficDS ingress node is responsible for ensuring that the traffic entering the

DS domain conforms to the TCA

DS egress node perform traffic conditioning functions

on traffic forwarded to another domain

Page 11: An Architecture for Differentiated Services

Diffserv RegionA set of one or more contiguous DS domainsTo permit services which span across the domains, the peering DS domains must each establish a peering SLASeveral DS domains within a DS region— Adopt a common service provisioning policy Support a common set of PHB groups and

codepoint mappings

Page 12: An Architecture for Differentiated Services

Traffic classification and conditioning

Packet classification policy Identify the subset of traffic

Traffic conditioning performs: Metering Shaping Policing Remarking

Page 13: An Architecture for Differentiated Services

Classifiers

Select packets in a traffic stream based on the content of some portion of the packet headerTwo types of classifiers— BA (Behavior Aggregate) classifier

Classify the packets based on codepoint only

MF (Multi-Field) classifier Classify the packets based on the value of

a combination of one or more header fields

Page 14: An Architecture for Differentiated Services

Traffic profiles

Specifies the temporal properties of a traffic stream selected by a classifierProvides rules for determining whether a particular packet is in-profile or out-of-profileExample: codepoint=X, use token-bucket r, b r—rate ; b—burst size

Page 15: An Architecture for Differentiated Services

Traffic conditionersA traffic conditioner may contain the following elements: Meter Marker Shaper Dropper

A traffic stream is selected by a classifierClassifier steers the packets to a logical instance of a traffic conditioner

Page 16: An Architecture for Differentiated Services

Logical view of classifier and conditioner

Classifier

Meter

MarkerShaper/ DropperPackets

Page 17: An Architecture for Differentiated Services

Traffic conditioners

Meters measure the temporal properties of

the stream of packets passes state information to other

conditioning functions

Markers Set the DS field of a packet to a

particular codepoint re-marked the packets

Page 18: An Architecture for Differentiated Services

Traffic conditioners

Shapers Delay packets in a traffic stream Discard packets when the buffer is full

Droppers Discard packets in a traffic stream Can be implemented by set the

shaper buffer size to zero

Page 19: An Architecture for Differentiated Services

Location of traffic conditioners

Within the source domain Marking packets close to the traffic

source

At the boundary of a DS domain Ingress and egress nodes

In non-DS-capable domainsIn interior DS nodes More restrictive access policies may

be enforced on a transoceanic link

Page 20: An Architecture for Differentiated Services

Per-Hop Behaviors

The externally observable behavior of a DS node applied to a particular DS behavior aggregatePHBs are implemented in nodes by means of some buffer management and packet scheduling mechanismsA PHB is selected at a node by a mapping of the DS codepoint

Page 21: An Architecture for Differentiated Services

Resource Allocation

Traffic conditioners can further control the usage of resources through— Enforcement of TCAs Operational feedback from the nodes

and traffic conditioners in the domain

Page 22: An Architecture for Differentiated Services

PHB Specification Guidelines

Help foster implementation consistencyA PHB group must satisfy the guidelinesPreserve the integrity of this architectureThere are totally 15 guidelines in the RFC 2475

Page 23: An Architecture for Differentiated Services

Non-Diffserv-Compliant Nodes

Does not interpret the DS field as specified in [DSFIELD]Dose not implement some or all of the PHB standardized PHBsDue to the capabilities or configuration of the nodeA special case of a non-DS-compliant node is the legacy node

Page 24: An Architecture for Differentiated Services

Non-Diffserv-Compliant Nodes

The use of non-DS-compliant nodes within a DS domain Impossible to offer low-delay, low-loss,

or provisioned bandwidth services The use of a legacy node may be an

acceptable alternative The legacy node may or may not

interpret bits 3-5 in accordance with RFC1349 Result in unpredictable forwarding results

Page 25: An Architecture for Differentiated Services

Non-Diffserv-Compliant Nodes

The behavior of services which traverse non-DS-capable domains Limit the ability to consistently deliver

some types of services across the domain

A DS domain and a non-DS-capable domain may negotiate an agreement

A traffic stream form no-DS-capable domain to DS domain should be conditioned according to the appropriate SLA or policy

Page 26: An Architecture for Differentiated Services

Multicast considerations

Multicast packets may simultaneously take multiple paths through some segments of the domainConsume more network resources than unicast packetsMulticast group membership is dynamic Difficult to predict in advance the

amount of network resources

Page 27: An Architecture for Differentiated Services

Multicast considerations

The selection of the DS codepoint for a multicast packet arriving at a DS ingress nodePacket may exit the DS domain at multiple DS egress nodesThe service guarantees for unicast traffic may be impacted

Page 28: An Architecture for Differentiated Services

Multicast considerations

One means for addressing this problem: Establish a particular set of

codepoints for multicast packets Implement the necessary

classification and traffic conditioning mechanisms in the DS egress nodes

Provide preferential isolation for unicast traffic

Page 29: An Architecture for Differentiated Services

Security Considerations

Theft and Denial of Service An adversary may be able to obtain

better service by modifying the DS field to codepoint

The theft of service becomes denial-of-service when it depletes the resources

Traffic conditioning at DS boundary nodes bust be along with security and integrity

Page 30: An Architecture for Differentiated Services

IPsec and Tunneling Interactions

IPsec’s tunnel mode provides security for the encapsulated IP header’s DS fieldA tunnel mode IPsec packet contains 2 IP headers: Outer header supplied by the tunnel

ingress node Encapsulated inner header supplied by

the original source of the packet

Page 31: An Architecture for Differentiated Services

IPsec and Tunneling Interactions

At the tunnel egress node, IPsec processing includes: Stripping the outer header Forwarding the packet using the inner

header

The tunnel egress node can safely assume that the DS field in the inner header has the same value as it had at the tunnel ingress node