⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2815.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
Network Working Group                                          M. SeamanRequest for Comments: 2815                                       TelseonCategory: Standards Track                                       A. Smith                                                        Extreme Networks                                                              E. Crawley                                                     Unisphere Solutions                                                           J. Wroclawski                                                                 MIT LCS                                                                May 2000            Integrated Service Mappings on IEEE 802 NetworksStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document describes mappings of IETF Integrated Services over   LANs built from IEEE 802 network segments which may be interconnected   by IEEE 802.1D MAC Bridges (switches).  It describes parameter   mappings for supporting Controlled Load and Guaranteed Service using   the inherent capabilities of relevant IEEE 802 technologies and, in   particular, 802.1D-1998 queuing features in switches.   These mappings are one component of the Integrated Services over IEEE   802 LANs framework.Seaman, et al.              Standards Track                     [Page 1]RFC 2815         Int-Serv Mappings on IEEE 802 Networks         May 2000Table of Contents   1 Introduction ............................................... 2   2 Flow Identification and Traffic Class Selection ............ 3   3 Choosing a flow's IEEE 802 user_priority class ............. 5   3.1 Context of admission control and delay bounds ............ 6   3.2 Default service mappings ................................. 7   3.3 Discussion ............................................... 9   4 Computation of integrated services characterization parameters        by IEEE 802 devices .....................................10   4.1 General characterization parameters ......................10   4.2 Parameters to implement Guaranteed Service ...............11   4.3 Parameters to implement Controlled Load ..................11   4.4 Parameters to implement Best Effort ......................12   5 Merging of RSVP/SBM objects ................................12   6 Applicability of these service mappings ....................13   7 References .................................................14   8 Security Considerations ....................................15   9 Acknowledgments ............................................15   10 Authors' Addresses ........................................16   11 Full Copyright Statement ..................................171.  Introduction   The IEEE 802.1 Interworking Task Group has developed a set of   enhancements to the basic MAC Service provided in Bridged Local Area   Networks (a.k.a. "switched LANs"). As a supplement to the original   IEEE MAC Bridges standard, IEEE 802.1D-1990 [802.1D-ORIG], the   updated IEEE 802.1D-1998 [802.1D] proposes differential traffic class   queuing in switches. The IEEE 802.1Q specification [802.1Q] extends   the capabilities of Ethernet/802.3 media to carry a traffic class   indicator, or "user_priority" field, within data frames.   The availability of this differential traffic queuing, together with   additional mechanisms to provide admission control and signaling,   allows IEEE 802 networks to support a close approximation of the IETF   Integrated Services capabilities [CL][GS]. This document describes   methods for mapping the service classes and parameters of the IETF   model into IEEE 802.1D network parameters.  A companion document   [SBM] describes a signaling protocol for use with these mappings.  It   is recommended that readers be familiar with the overall framework in   which these mappings and signaling protocol are expected to be used;   this framework is described fully in [IS802FRAME].   Within this document, Section 2 describes the method by which end   systems and routers bordering the IEEE Layer-2 cloud learn what   traffic class should be used for each data flow's packets.  Section 3   describes the approach recommended to map IP-level traffic flows toSeaman, et al.              Standards Track                     [Page 2]RFC 2815         Int-Serv Mappings on IEEE 802 Networks         May 2000   IEEE traffic classes within the Layer 2 network.  Section 4 describes   the computation of Characterization Parameters by the layer 2   network.  The remaining sections discuss some particular issues with   the use of the RSVP/SBM signaling protocols, and describe the   applicability of all of the above to different layer 2 network   topologies.2.  Flow Identification and Traffic Class Selection   One model for supporting integrated services over specific link   layers treats layer-2 devices very much as a special case of routers.   In this model, switches and other devices along the data path make   packet handling decisions based on the RSVP flow and filter   specifications, and use these specifications to classify the   corresponding data packets. The specifications could either be used   directly, or could be used indirectly by mapping each RSVP session   onto a layer-2 construct such as an ATM virtual circuit.   This approach is inappropriate for use in the IEEE 802 environment.   Filtering to the per-flow level becomes expensive with increasing   switch speed; devices with such filtering capabilities are likely to   have a very similar implementation complexity to IP routers, and may   not make use of simpler mechanisms such as 802.1D user priority.   The Integrated Services over IEEE 802 LANs framework [IS802FRAME] and   this document use an "aggregated flow" approach based on use of   layer-2 traffic classes. In this model, each arriving flow is   assigned to one of the available classes for the duration of the flow   and traverses the 802 cloud in this class.  Traffic flows requiring   similar service are grouped together into a single class, while the   system's admission control and class selection rules ensure that the   service requirements for flows in each of the classes are met.  In   many situations this is a viable intermediate point between no QoS   control and full router-type integrated services. The approach can   work effectively even with switches implementing only the simplest   differential traffic classification capability specified in the   802.1D model.  In the aggregated flow model, traffic arriving at the   boundary of a layer-2 cloud is tagged by the boundary device (end   host or border router) with an appropriate traffic class, represented   as an 802.1D "user_priority" value. Two fundamental questions are   "who determines the correspondence between IP-level traffic flows and   link-level classes?" and  "how is this correspondence conveyed to the   boundary devices that must mark the data frames?"   One approach to answering these questions would be for the meanings   of the classes to be universally defined. This document would then   standardize the meanings of a set of classes; e.g., 1 = best effort,   2 = 100 ms peak delay target, 3 = 10 ms peak delay target, 4 = 1 msSeaman, et al.              Standards Track                     [Page 3]RFC 2815         Int-Serv Mappings on IEEE 802 Networks         May 2000   peak delay target, etc. The meanings of these universally defined   classes could then be encoded directly in end stations, and the   flow-to-class mappings computed directly in these devices.   This universal definition approach would be simple to implement, but   is too rigid to map the wide range of possible user requirements onto   the limited number of available 802.1D classes. The model described   in [IS802FRAME] uses a more flexible mapping: clients ask "the   network" which user_priority traffic class to use for a given traffic   flow, as categorized by its flow-spec and layer-2 endpoints. The   network provides a value back to the requester that is appropriate   considering the current network topology, load conditions, other   admitted flows, etc.  The task of configuring switches with this   mapping (e.g., through network management, a switch-switch protocol   or via some network-wide QoS-mapping directory service) is an order   of magnitude less complex than performing the same function in end   stations. Also, when new services (or other network reconfigurations)   are added to such a network, the network elements will typically be   the ones to be upgraded with new queuing algorithms etc. and can be   provided with new mappings at this time.   In the current model it is assumed that all data packets of a flow   are assigned to the same traffic class for the duration of the flow:   the characteristics of the MAC service, as defined by Clause 6 of   [802.1D], then ensure the ordering of the data packets of the flow   between adjacent Layer 3 routers. This is usually desirable to avoid   potential re-ordering problems as discussed in [IS802FRAME] and [CL].   Note that there are some scenarios where it might be desirable to   send conforming data traffic in one traffic class and non-conforming   traffic for the same flow in a different, lower traffic class: such a   division into separate traffic classes is for future study.  When a   new session or "flow" requiring QoS support is created, a client must   ask "the network" which traffic class (IEEE 802 user_priority) to use   for a given traffic flow, so that it can label the packets of the   flow as it places them into the network.  A request/response protocol   is needed between client and network to return this information. The   request can be piggy-backed onto an admission control request and the   response can be piggy-backed onto an admission control   acknowledgment. This "one pass" assignment has the benefit of   completing the admission control transaction in a timely way and   reducing the exposure to changing conditions that could occur if   clients cached the knowledge for extensive periods. A set of   extensions to the RSVP protocol for communicating this information   have been defined [SBM].   The network (i.e., the first network element encountered downstream   from the client) must then answer the following questions:Seaman, et al.              Standards Track                     [Page 4]RFC 2815         Int-Serv Mappings on IEEE 802 Networks         May 2000     1. Which of the available traffic classes would be appropriate for        this flow?        In general, a newly arriving flow might be assigned to a number        of classes. For example, if 10ms of delay is acceptable, the        flow could potentially be assigned to either a 10ms delay class        or a 1ms delay class. This packing problem is quite difficult to        solve if the target parameters of the classes are allowed to        change dynamically as flows arrive and depart.  It is quite        simple if the target parameters of each class is held fixed, and        the class table is simply searched to find a class appropriate        for the arriving flow.  This document adopts the latter        approach.     2. Of the appropriate traffic classes, which if any have enough        capacity available to accept the new flow?        This is the admission control problem. It is necessary to        compare the level of traffic currently assigned to each class        with the available level of network resources (bandwidth,        buffers, etc), to ensure that adding the new flow to the class        will not cause the class's performance to go below its target        values. This problem is compounded because in a priority queuing        system adding traffic to a higher-priority class can affect the        performance of lower-priority classes. The admission control        algorithm for a system using the default 802 priority behavior        must be reasonably sophisticated to provide acceptable results.   If an acceptable class is found, the network returns the chosen   user_priority value to the client.   Note that the client may be an end station, a router at the edge of   the layer 2 network, or a first switch acting as a proxy for a device   that does not participate in these protocols for whatever reason.   Note also that a device e.g., a server or router may choose to   implement both the "client" as well as the "network" portion of this   model so that it can select its own user_priority values. Such an   implementation would generally be discouraged unless the device has a   close tie-in with the network topology and resource allocation   policies. It may, however, work acceptably in cases where there is   known over-provisioning of resources.3.  Choosing a flow's IEEE 802 user_priority class   This section describes the method by which IP-level flows are mapped   into appropriate IEEE user_priority classes. The IP-level services   considered are Best Effort, Controlled Load, and Guaranteed Service.Seaman, et al.              Standards Track                     [Page 5]RFC 2815         Int-Serv Mappings on IEEE 802 Networks         May 2000   The major issue is that admission control requests and application   requirements are specified in terms of a multidimensional vector of   parameters e.g., bandwidth, delay, jitter, service class.  This   multidimensional space must be mapped onto a set of traffic classes   whose default behavior in L2 switches is unidimensional (i.e., strict   priority default queuing). This priority queuing alone can provide   only relative ordering between traffic classes. It can neither   enforce an absolute (quantifiable) delay bound for a traffic class,   nor can it discriminate amongst Int-Serv flows within the aggregate   in a traffic class. Therefore, it cannot provide the absolute control   of packet loss and delay required for individual Int-Serv flows.   To provide absolute control of loss and delay three things must   occur:   (1) The amount of bandwidth available to the QoS-controlled flows       must be known, and the number of flows admitted to the network       (allowed to use the bandwidth) must be limited.   (2) A traffic scheduling mechanism is needed to give preferential       service to flows with lower delay targets.   (3) Some mechanism must ensure that best-effort flows and QoS       controlled flows that are exceeding their Tspecs do not damage       the quality of service delivered to in-Tspec QoS controlled       flows. This mechanism could be part of the traffic scheduler, or       it could be a separate policing mechanism.   For IEEE 802 networks, the first function (admission control) is   provided by a Subnet Bandwidth Manager, as discussed below. We use   the link-level user_priority mechanism at each switch and bridge to   implement the second function (preferential service to flows with   lower delay targets). Because a simple priority scheduler cannot

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -