Movatterモバイル変換


[0]ホーム

URL:


[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

INFORMATIONAL
Network Working Group                                              T. LiRequest for Comments: 2430                              Juniper NetworksCategory: Informational                                       Y. Rekhter                                                           Cisco Systems                                                            October 1998A Provider Architecture forDifferentiated Services and Traffic Engineering(PASTE)Status of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.1.0 Abstract   This document describes the Provider Architecture for Differentiated   Services and Traffic Engineering (PASTE) for Internet Service   Providers (ISPs).  Providing differentiated services in ISPs is a   challenge because the scaling problems presented by the sheer number   of flows present in large ISPs makes the cost of maintaining per-flow   state unacceptable.  Coupled with this, large ISPs need the ability   to perform traffic engineering by directing aggregated flows of   traffic along specific paths.   PASTE addresses these issues by using Multiprotocol Label Switching   (MPLS) [1] and the Resource Reservation Protocol (RSVP) [2] to create   a scalable traffic management architecture that supports   differentiated services.  This document assumes that the reader has   at least some familiarity with both of these technologies.2.0 Terminology   In common usage, a packet flow, or a flow, refers to a unidirectional   stream of packets, distributed over time.  Typically a flow has very   fine granularity and reflects a single interchange between hosts,   such as a TCP connection.  An aggregated flow is a number of flows   that share forwarding state and a single resource reservation along a   sequence of routers.Li & Rekhter                 Informational                      [Page 1]

RFC 2430                         PASTE                      October 1998   One mechanism for supporting aggregated flows is Multiprotocol Label   Switching (MPLS).  In MPLS, packets are tunneled by wrapping them in   a minimal header [3].  Each such header contains a label, that   carries both forwarding and resource reservation semantics.  MPLS   defines mechanisms to install label-based forwarding information   along a series of Label Switching Routers (LSRs) to construct a Label   Switched Path (LSP).  LSPs can also be associated with resource   reservation information.   One protocol for constructing such LSPs is the Resource Reservation   Protocol (RSVP) [4].  When used with the Explicit Route Object (ERO)   [5], RSVP can be used to construct an LSP along an explicit route   [6].   To support differentiated services, packets are divided into separate   traffic classes.  For conceptual purposes, we will discuss three   different traffic classes: Best Effort, Priority, and Network   Control.  The exact number of subdivisions within each class is to be   defined.   Network Control traffic primarily consists of routing protocols and   network management traffic.  If Network Control traffic is dropped,   routing protocols can fail or flap, resulting in network instability.   Thus, Network Control must have very low drop preference.  However,   Network Control traffic is generally insensitive to moderate delays   and requires a relatively small amount of bandwidth.  A small   bandwidth guarantee is sufficient to insure that Network Control   traffic operates correctly.   Priority traffic is likely to come in many flavors, depending on the   application.  Particular flows may require bandwidth guarantees,   jitter guarantees, or upper bounds on delay.  For the purposes of   this memo, we will not distinguish the subdivisions of priority   traffic.  All priority traffic is assumed to have an explicit   resource reservation.   Currently, the vast majority of traffic in ISPs is Best Effort   traffic.  This traffic is, for the most part, delay insensitive and   reasonably adaptive to congestion.   When flows are aggregated according to their traffic class and then   the aggregated flow is placed inside a LSP, we call the result a   traffic trunk, or simply a trunk.  The traffic class of a packet is   orthogonal to the LSP that it is on, so many different trunks, each   with its own traffic class, may share an LSP if they have different   traffic classes.Li & Rekhter                 Informational                      [Page 2]

RFC 2430                         PASTE                      October 19983.0 Introduction   The next generation of the Internet presents special challenges that   must be addressed by a single, coordinated architecture.  While this   architecture allows for distinction between ISPs, it also defines a   framework within which ISPs may provide end-to-end differentiated   services in a coordinated and reliable fashion.  With such an   architecture, an ISP would be able to craft common agreements for the   handling of differentiated services in a consistent fashion,   facilitating end-to-end differentiated services via a composition of   these agreements.  Thus, the goal of this document is to describe an   architecture for providing differentiated services within the ISPs of   the Internet, while including support for other forthcoming needs   such as traffic engineering.  While this document addresses the needs   of the ISPs, its applicability is not limited to the ISPs.  The same   architecture could be used in any large, multiprovider catenet   needing differentiated services.   This document only discusses unicast services.  Extensions to the   architecture to support multicast are a subject for future research.   One of the primary considerations in any ISP architecture is   scalability.  Solutions that have state growth proportional to the   size of the Internet result in growth rates exceeding Moore's law,   making such solutions intractable in the long term.  Thus, solutions   that use mechanisms with very limited growth rates are strongly   preferred.   Discussions of differentiated services to date have frequently   resulted in solutions that require per-flow state or per-flow   queuing.  As the number of flows in an ISP within the "default-free   zone of the Internet" scales with the size of the Internet, the   growth rate is difficult to support and argues strongly for a   solution with lower state requirements.  Simultaneously, supporting   differentiated services is a significant benefit to most ISPs.  Such   support would allow providers to offer special services such as   priority for bandwidth for mission critical services for users   willing to pay a service premium.  Customers would contract with ISPs   for these services under Service Level Agreements (SLAs).  Such an   agreement may specify the traffic volume, how the traffic is handled,   either in an absolute or relative manner, and the compensation that   the ISP receives.   Differentiated services are likely to be deployed across a single ISP   to support applications such as a single enterprise's Virtual Private   Network (VPN).  However, this is only the first wave of service   implementation.  Closely following this will be the need for   differentiated services to support extranets, enterprise VPNs thatLi & Rekhter                 Informational                      [Page 3]

RFC 2430                         PASTE                      October 1998   span ISPs, or industry interconnection networks such as the ANX [7].   Because such applications span enterprises and thus span ISPs, there   is a clear need for inter-domain SLAs.  This document discusses the   technical architecture that would allow the creation of such inter-   domain SLAs.   Another important consideration in this architecture is the advent of   traffic engineering within ISPs.  Traffic engineering is the ability   to move trunks away from the path selected by the ISP's IGP and onto   a different path.  This allows an ISP to route traffic around known   points of congestion in its network, thereby making more efficient   use of the available bandwidth.  In turn, this makes the ISP more   competitive within its market by allowing the ISP to pass lower costs   and better service on to its customers.   Finally, the need to provide end-to-end differentiated services   implies that the architecture must support consistent inter-provider   differentiated services.  Most flows in the Internet today traverse   multiple ISPs, making a consistent description and treatment of   priority flows across ISPs a necessity.4.0 Components of the Architecture   The Differentiated Services Backbone architecture is the integration   of several different mechanisms that, when used in a coordinated way,   achieve the goals outlined above.  This section describes each of the   mechanisms used in some detail.  Subsequent sections will then detail   the interoperation of these mechanisms.4.1 Traffic classes   As described above, packets may fall into a variety of different   traffic classes.  For ISP operations, it is essential that packets be   accurately classified before entering the ISP and that it is very   easy for an ISP device to determine the traffic class for a   particular packet.   The traffic class of MPLS packets can be encoded in the three bits   reserved for CoS within the MPLS label header.  In addition, traffic   classes for IPv4 packets can be classified via the IPv4 ToS byte,   possibly within the three precedence bits within that byte.  Note   that the consistent interpretation of the traffic class, regardless   of the bits used to indicate this class, is an important feature of   PASTE.Li & Rekhter                 Informational                      [Page 4]

RFC 2430                         PASTE                      October 1998   In this architecture it is not overly important to control which   packets entering the ISP have a particular traffic class.  From the   ISP's perspective, each Priority packet should involve some economic   premium for delivery.  As a result the ISP need not pass judgment as   to the appropriateness of the traffic class for the application.   It is important that any Network Control traffic entering an ISP be   handled carefully.  The contents of such traffic must also be   carefully authenticated.  Currently, there is no need for traffic   generated external to a domain to transit a border router of the ISP.4.2 Trunks   As described above, traffic of a single traffic class that is   aggregated into a single LSP is called a traffic trunk, or simply a   trunk.  Trunks are essential to the architecture because they allow   the overhead in the infrastructure to be decoupled from the size of   the network and the amount of traffic in the network.  Instead, as   the traffic scales up, the amount of traffic in the trunks increases;   not the number of trunks.   The number of trunks within a given topology has a worst case of one   trunk per traffic class from each entry router to each exit router.   If there are N routers in the topology and C classes of service, this   would be (N * (N-1) * C) trunks.  Fortunately, instantiating this   many trunks is not always necessary.   Trunks with a single exit point which share a common internal path   can be merged to form a single sink tree.  The computation necessary   to determine if two trunks can be merged is straightforward.  If,   when a trunk is being established, it intersects an existing trunk   with the same traffic class and the same remaining explicit route,   the new trunk can be spliced into the existing trunk at the point of   intersection.  The splice itself is straightforward: both incoming   trunks will perform a standard label switching operation, but will   result in the same outbound label.  Since each sink tree created this   way touches each router at most once and there is one sink tree per   exit router, the result is N * C sink trees.   The number of trunks or sink trees can also be reduced if multiple   trunks or sink trees for different classes follow the same path.   This works because the traffic class of a trunk or sink tree is   orthogonal to the path defined by its LSP.  Thus, two trunks with   different traffic classes can share a label for any part of the   topology that is shared and ends in the exit router.  Thus, the   entire topology can be overlaid with N trunks.Li & Rekhter                 Informational                      [Page 5]

RFC 2430                         PASTE                      October 1998   Further, if Best Effort trunks and individual Best Effort flows are   treated identically, there is no need to instantiate any Best Effort   trunk that would follow the IGP computed path.  This is because the   packets can be directly forwarded without an LSP. However, traffic   engineering may require Best Effort trunks to be treated differently   from the individual Best Effort flows, thus requiring the   instantiation of LSPs for Best Effort trunks.  Note that Priority   trunks must be instantiated because end-to-end RSVP packets to   support the aggregated Priority flows must be tunneled.   Trunks can also be aggregated with other trunks by adding a new label   to the stack of labels for each trunk, effectively bundling the   trunks into a single tunnel.  For the purposes of this document, this   is also considered a trunk, or if we need to be specific, this will   be called an aggregated trunk.  Two trunks can be aggregated if they   share a portion of their path.  There is no requirement on the exact   length of the common portion of the path, and thus the exact   requirements for forming an aggregated trunk are beyond the scope of   this document.  Note that traffic class (i.e., QoS indication) is   propagated when an additional label is added to a trunk, so trunks of   different classes may be aggregated.   Trunks can be terminated at any point, resulting in a deaggregation   of traffic.  The obvious consequence is that there needs to be   sufficient switching capacity at the point of deaggregation to deal   with the resultant traffic.   High reliability for a trunk can be provided through the use of one   or more backup trunks.  Backup trunks can be initiated either by the   same router that would initiate the primary trunk or by another   backup router.  The status of the primary trunk can be ascertained by   the router that initiated the backup trunk (note that this may be   either the same or a different router as the router that initiated   the primary trunk) through out of band information, such as the IGP.   If a backup trunk is established and the primary trunk returns to   service, the backup trunk can be deactivated and the primary trunk   used instead.4.3 RSVP   Originally RSVP was designed as a protocol to install state   associated with resource reservations for individual flows   originated/destined to hosts, where path was determined by   destination-based routing. Quoting directly from the RSVP   specifications, "The RSVP protocol is used by a host, on behalf of an   application data stream, to request a specific quality of service   (QoS) from the network for particular data streams or flows"   [RFC2205].Li & Rekhter                 Informational                      [Page 6]

RFC 2430                         PASTE                      October 1998   The usage of RSVP in PASTE is quite different from the usage of RSVP   as it was originally envisioned by its designers.  The first   difference is that RSVP is used in PASTE to install state that   applies to a collection of flows that all share a common path and   common pool of reserved resources.  The second difference is that   RSVP is used in PASTE to install state related to forwarding,   including label switching information, in addition to resource   reservations.  The third difference is that the path that this state   is installed along is no longer constrained by the destination-based   routing.   The key factor that makes RSVP suitable for PASTE is the set of   mechanisms provided by RSVP. Quoting from the RSVP specifications,   "RSVP protocol mechanisms provide a general facility for creating and   maintaining distributed reservation state across a mesh of multicast   or unicast delivery paths." Moreover, RSVP provides a straightforward   extensibility mechanism by allowing for the creation of new RSVP   Objects. This flexibility allows us to also use the mechanisms   provided by RSVP to create and maintain distributed state for   information other than pure resource reservation, as well as allowing   the creation of forwarding state in conjunction with resource   reservation state.   The original RSVP design, in which "RSVP itself transfers and   manipulates QoS control parameters as opaque data, passing them to   the appropriate traffic control modules for interpretation" can thus   be extended to include explicit route parameters and label binding   parameters. Just as with QoS parameters, RSVP can transfer and   manipulate explicit route parameters and label binding parameters as   opaque data, passing explicit route parameters to the appropriate   forwarding module, and label parameters to the appropriate MPLS   module.   Moreover, an RSVP session in PASTE is not constrained to be only   between a pair of hosts, but is also used between pairs of routers   that act as the originator and the terminator of a traffic trunk.   Using RSVP in PASTE helps consolidate procedures for several tasks:   (a) procedures for establishing forwarding along an explicit route,   (b) procedures for establishing a label switched path, and (c) RSVP's   existing procedures for resource reservation.  In addition, these   functions can be cleanly combined in any manner.  The main advantage   of this consolidation comes from an observation that the above three   tasks are not independent, but inter-related. Any alternative that   accomplished each of these functions via independent sets of   procedures, would require additional coordination between functions,   adding more complexity to the system.Li & Rekhter                 Informational                      [Page 7]

RFC 2430                         PASTE                      October 19984.4 Traffic Engineering   The purpose of traffic engineering is to give the ISP precise control   over the flow of traffic within its network.  Traffic engineering is   necessary because standard IGPs compute the shortest path across the   ISP's network based solely on the metric that has been   administratively assigned to each link.  This computation does not   take into account the loading of each link.  If the ISP's network is   not a full mesh of physical links, the result is that there may not   be an obvious way to assign metrics to the existing links such that   no congestion will occur given known traffic patterns.  Traffic   engineering can be viewed as assistance to the routing infrastructure   that provides additional information in routing traffic along   specific paths, with the end goal of more efficient utilization of   networking resources.   Traffic engineering is performed by directing trunks along explicit   paths within the ISP's topology.  This diverts the traffic away from   the shortest path computed by the IGP and presumably onto uncongested   links, eventually arriving at the same destination.  Specification of   the explicit route is done by enumerating an explicit list of the   routers in the path.  Given this list, traffic engineering trunks can   be constructed in a variety of ways.  For example, a trunk could be   manually configured along the explicit path.  This would involve   configuring each router along the path with state information for   forwarding the particular label.  Such techniques are currently used   for traffic engineering in some ISPs today.   Alternately, a protocol such as RSVP can be used with an Explicit   Route Object (ERO) so that the first router in the path can establish   the trunk.  The computation of the explicit route is beyond the scope   of this document but may include considerations of policy, static and   dynamic bandwidth allocation, congestion in the topology and manually   configured alternatives.4.5 Resource reservation   Priority traffic has certain requirements on capacity and traffic   handling.  To provide differentiated services, the ISP's   infrastructure must know of, and support these requirements.  The   mechanism used to communicate these requirements dynamically is RSVP.   The flow specification within RSVP can describe many characteristics   of the flow or trunk.  An LSR receiving RSVP information about a flow   or trunk has the ability to look at this information and either   accept or reject the reservation based on its local policy.  This   policy is likely to include constraints about the traffic handling   functions that can be supported by the network and the aggregate   capacity that the network is willing to provide for Priority traffic.Li & Rekhter                 Informational                      [Page 8]

RFC 2430                         PASTE                      October 19984.6 Inter-Provider SLAs (IPSs)   Trunks that span multiple ISPs are likely to be based on legal   agreements and some other external considerations.  As a result, one   of the common functions that we would expect to see in this type of   architecture is a bilateral agreement between ISPs to support   differentiated services.  In addition to the obvious compensation,   this agreement is likely to spell out the acceptable traffic handling   policies and capacities to be used by both parties.   Documents similar to this exist today on behalf of Best Effort   traffic and are known as peering agreements.  Extending a peering   agreement to support differentiated services would effectively create   an Inter-Provider SLA (IPS).  Such agreements may include the types   of differentiated services that one ISP provides to the other ISP, as   well as the upper bound on the amount of traffic associated with each   such service that the ISP would be willing to accept and carry from   the other ISP.  Further, an IPS may limit the types of differentiated   services and an upper bound on the amount of traffic that may   originate from a third party ISP and be passed from one signer of the   IPS to the other.   If the expected costs associated with the IPS are not symmetric, the   parties may agree that one ISP will provide the other ISP with   appropriate compensation.  Such costs may be due to inequality of   traffic exchange, costs in delivering the exchanged traffic, or the   overhead involved in supporting the protocols exchanged between the   two ISPs.   Note that the PASTE architecture provides a technical basis to   establish IPSs, while the procedures necessary to create such IPSs   are outside the scope of PASTE.4.7 Traffic shaping and policing   To help support IPSs, special facilities must be available at the   interconnect between ISPs.  These mechanisms are necessary to insure   that the network transmitting a trunk of Priority traffic does so   within the agreed traffic characterization and capacity.  A   simplistic example of such a mechanism might be a token bucket   system, implemented on a per-trunk basis.  Similarly, there need to   be mechanisms to insure, on a per trunk basis, that an ISP receiving   a trunk receives only the traffic that is in compliance with the   agreement between ISPs.Li & Rekhter                 Informational                      [Page 9]

RFC 2430                         PASTE                      October 19984.8 Multilateral IPSs   Trunks may span multiple ISPs.  As a result, establishing a   particular trunk may require more than two ISPs.  The result would be   a multilateral IPS.  This type of agreement is unusual with respect   to existing Internet business practices in that it requires multiple   participating parties for a useful result.  This is also challenging   because without a commonly accepted service level definition, there   will need to be a multilateral definition, and this definition may   not be compatible used in IPSs between the same parties.   Because this new type of agreement may be a difficulty, it may in   some cases be simpler for certain ISPs to establish aggregated trunks   through other ISPs and then contract with customers to aggregate   their trunks.  In this way, trunks can span multiple ISPs without   requiring multilateral IPSs.   Either or both of these two alternatives are possible and acceptable   within this architecture, and the choice is left for the the   participants to make on a case-by-case basis.5.0 The Provider Architecture for differentiated Services and Traffic    Engineering (PASTE)   The Provider Architecture for differentiated Services and Traffic   Engineering (PASTE) is based on the usage of MPLS and RSVP as   mechanisms to establish differentiated service connections across   ISPs.  This is done in a scalable way by aggregating differentiated   flows into traffic class specific MPLS tunnels, also known as traffic   trunks.   Such trunks can be given an explicit route by an ISP to define the   placement of the trunk within the ISP's infrastructure, allowing the   ISP to traffic engineer its own network.  Trunks can also be   aggregated and merged, which helps the scalability of the   architecture by minimizing the number of individual trunks that   intermediate systems must support.   Special traffic handling operations, such as specific queuing   algorithms or drop computations, can be supported by a network on a   per-trunk basis, allowing these services to scale with the number of   trunks in the network.   Agreements for handling of trunks between ISPs require both legal   documentation and conformance mechanisms on both sides of the   agreement.  As a trunk is unidirectional, it is sufficient for the   transmitter to monitor and shape outbound traffic, while the receiver   polices the traffic profile.Li & Rekhter                 Informational                     [Page 10]

RFC 2430                         PASTE                      October 1998   Trunks can either be aggregated across other ISPs or can be the   subject of a multilateral agreement for the carriage of the trunk.   RSVP information about individual flows is tunneled in the trunk to   provide an end-to-end reservation.  To insure that the return RSVP   traffic is handled properly, each trunk must also have another tunnel   running in the opposite direction.  Note that the reverse tunnel may   be a different trunk or it may be an independent tunnel terminating   at the same routers as the trunk.  Routing symmetry between a trunk   and its return is not assumed.   RSVP already contains the ability to do local path repair.  In the   event of a trunk failure, this capability, along with the ability to   specify abstractions in the ERO, allows RSVP to re-establish the   trunk in many failure scenarios.6.0 Traffic flow in the PASTE architecture   As an example of the operation of this architecture, we consider an   example of a single differentiated flow.  Suppose that a user wishes   to make a telephone call using a Voice over IP service.  While this   call is full duplex, we can consider the data flow in each direction   in a half duplex fashion because the architecture operates   symmetrically.   Suppose that the data packets for this voice call are created at a   node S and need to traverse to node D.  Because this is a voice call,   the data packets are encoded as Priority packets.  If there is more   granularity within the traffic classes, these packets might be   encoded as wanting low jitter and having low drop preference.   Initially this is encoded into the precedence bits of the IPv4 ToS   byte.6.1 Propagation of RSVP messages   To establish the flow to node D, node S first generates an RSVP PATH   message which describes the flow in more detail.  For example, the   flow might require 3kbps of bandwidth, be insensitive to jitter of   less than 50ms, and require a delay of less than 200ms.  This message   is passed through node S's local network and eventually appears in   node S's ISP.  Suppose that this is ISP F.   ISP F has considerable latitude in its options at this point.  The   requirement on F is to place the flow into a trunk before it exits   F's infrastructure.  One thing that F might do is to perform the   admission control function at the first hop router.  At this point, F   would determine if it had the capacity and capability of carrying the   flow across its own infrastructure to an exit router E.  If the   admission control decision is negative, the first hop router canLi & Rekhter                 Informational                     [Page 11]

RFC 2430                         PASTE                      October 1998   inform node S using RSVP.  Alternately, it can propagate the RSVP   PATH message along the path to exit router E.  This is simply normal   operation of RSVP on a differentiated flow.   At exit router E, there is a trunk that ISP F maintains that transits   ISP X, Y, and Z and terminates in ISP L.  Based on BGP path   information or on out of band information, Node D is known to be a   customer of ISP L.  Exit router E matches the flow requirements in   the RSVP PATH message to the characteristics (e.g., remaining   capacity) of the trunk to ISP L.  Assuming that the requirements are   compatible, it then notes that the flow should be aggregated into the   trunk.   To insure that the flow reservation happens end to end, the RSVP PATH   message is then encapsulated into the trunk itself, where it is   transmitted to ISP L.  It eventually reaches the end of the trunk,   where it is decapsulated by router U.  PATH messages are then   propagated all the way to the ultimate destination D.   Note that the end-to-end RSVP RESV messages must be carefully handled   by router U.  The RESV messages from router U to E must return via a   tunnel back to router E.   RSVP is also used by exit router E to initialize and maintain the   trunk to ISP L.  The RSVP messages for this trunk are not placed   within the trunk itself but the end-to-end RSVP messages are.  The   existence of multiple overlapping RSVP sessions in PASTE is   straightforward, but requires explicit enumeration when discussing   particular RSVP sessions.6.2 Propagation of user data   Data packets created by S flow through ISP F's network following the   flow reservation and eventually make it to router E.  At that point,   they are given an MPLS label and placed in the trunk.  Normal MPLS   switching will propagate this packet across ISP X's network.  Note   that the same traffic class still applies because the class encoding   is propagated from the precedence bits of the IPv4 header to the CoS   bits in the MPLS label.  As the packet exits ISP X's network, it can   be aggregated into another trunk for the express purpose of   tranisiting ISP Y.   Again, label switching is used to bring the packet across ISP Y's   network and then the aggregated trunk terminates at a router in ISP   Z's network.  This router deaggregates the trunk, and forwards the   resulting trunk towards ISP L.  This trunk transits ISP Z and   terminates in ISP L at router U.  At this point, the data packets are   removed from the trunk and forwarded along the path computed by RSVP.Li & Rekhter                 Informational                     [Page 12]

RFC 2430                         PASTE                      October 19986.3 Trunk establishment and maintenance   In this example, there are two trunks in use.  One trunk runs from   ISP F, through ISPs X, Y and Z, and then terminates in ISP L.  The   other aggregated trunk begins in ISP X, transits ISP Y and terminates   in ISP Z.   The first trunk may be established based on a multilateral agreement   between ISPs F, X, Z and L.  Note that ISP Y is not part of this   multilateral agreement, and ISP X is contractually responsible for   providing carriage of the trunk into ISP Z.  Also per this agreement,   the tunnel is maintained by ISP F and is initialized and maintained   through the use of RSVP and an explicit route object that lists ISP's   X, Z, and L.  Within this explicit route, ISP X and ISP L are given   as strict hops, thus constraining the path so that there may not be   other ISPs intervening between the pair of ISPs F and X and the pair   Z and L.  However, no constraint is placed on the path between ISPs X   and Z.  Further, there is no constraint placed on which router   terminates the trunk within L's infrastructure.   Normally this trunk is maintained by one of ISP F's routers adjacent   to ISP X.  For robustness, ISP F has a second router adjacent to ISP   X, and that provides a backup trunk.   The second trunk may be established by a bilateral agreement between   ISP X and Y.  ISP Z is not involved.  The second trunk is constrained   so that it terminates on the last hop router within Y's   infrastructure.  This tunnel is initialized and maintained through   the use of RSVP and an explicit route that lists the last hop router   within ISP Y's infrastructure.  In order to provide redundancy in the   case of the failure of the last hop router, there are multiple   explicit routes configured into ISP X's routers.  These routers can   select one working explicit route from their configured list.   Further, in order to provide redundancy against the failure of X's   primary router, X provides a backup router with a backup trunk.6.4 Robustness   Note that in this example, there are no single points of failure once   the traffic is within ISP F's network.  Each trunk has a backup trunk   to protect against the failure of the primary trunk.  To protect   against the failure of any particular router, each trunk can be   configured with multiple explicit route objects that terminate at one   of several acceptable routers.Li & Rekhter                 Informational                     [Page 13]

RFC 2430                         PASTE                      October 19987.0 Security Considerations   Because Priority traffic intrinsically has more 'value' than Best   Effort traffic, the ability to inject Priority traffic into a network   must be carefully controlled.  Further, signaling concerning Priority   traffic has to be authenticated because it is likely that the   signaling information will result in specific accounting and   eventually billing for the Priority services.  ISPs are cautioned to   insure that the Priority traffic that they accept is in fact from a   known previous hop.  Note that this is a simple requirement to   fulfill at private peerings, but it is much more difficult at public   interconnects.  For this reason, exchanging Priority traffic at   public interconnects should be done with great care.   RSVP traffic needs to be authenticated.  This can possibly be done   through the use of the Integrity Object.8.0 Conclusion   The Provider Architecture for differentiated Services and Traffic   Engineering (PASTE) provides a robust, scalable means of deploying   differentiated services in the Internet.  It provides scalability by   aggregating flows into class specific MPLS tunnels.  These tunnels,   also called trunks, can in turn be aggregated, thus leading to a   hierarchical aggregation of traffic.   Trunk establishment and maintenance is done with RSVP, taking   advantage of existing work in differentiated services.  Explicit   routes within the RSVP signaling structure allow providers to perform   traffic engineering by placing trunks on particular links in their   network.   The result is an architecture that is sufficient to scale to meet ISP   needs and can provide differentiated services in the large, support   traffic engineering, and continue to grow with the Internet.8.1 Acknowledgments   Inspiration and comments about this document came from Noel Chiappa,   Der-Hwa Gan, Robert Elz, Lisa Bourgeault, and Paul Ferguson.Li & Rekhter                 Informational                     [Page 14]

RFC 2430                         PASTE                      October 19989.0 References   [1] Rosen, E., Viswanathan, A., and R. Callon, "A Proposed       Architecture for MPLS", Work in Progress.   [2] Braden, R., Zhang, L., Berson, S., Herzog, S., and S. Jamin,       "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional       Specification",RFC 2205, September 1997.   [3] Rosen, E., Rekhter, Y., Tappan, D., Farinacci, D., Fedorkow,, G.,       Li, T., and A. Conta, "MPLS Label Stack Encoding", Work in       Progress.   [4] Davie, B., Rekhter, Y., Rosen, E., Viswanathan, A., and V.       Srinivasan, "Use of Label Switching With RSVP", Work in Progress.   [5] Gan, D.-H., Guerin, R., Kamat, S., Li, T., and E. Rosen, "Setting       up Reservations on Explicit Paths using RSVP", Work in Progress.   [6] Davie, B., Li, T., Rosen, E., and Y. Rekhter, "Explicit Route       Support in MPLS", Work in Progress.   [7]http://www.anxo.com/10.0 Authors' Addresses   Tony Li   Juniper Networks, Inc.   385 Ravendale Dr.   Mountain View, CA 94043   Phone: +1 650 526 8006   Fax:   +1 650 526 8001   EMail: tli@juniper.net   Yakov Rekhter   cisco Systems, Inc.   170 W. Tasman Dr.   San Jose, CA 95134   EMail:  yakov@cisco.comLi & Rekhter                 Informational                     [Page 15]

RFC 2430                         PASTE                      October 199811.  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Li & Rekhter                 Informational                     [Page 16]

[8]ページ先頭

©2009-2025 Movatter.jp