⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2702.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Awduche, et al.              Informational                     [Page 21]RFC 2702                MPLS Traffic Engineering          September 19996.2 Resource Class Attribute   Resource class attributes are administratively assigned parameters   which express some notion of "class" for resources. Resource class   attributes can be viewed as "colors" assigned to resources such that   the set of resources with the same "color" conceptually belong to the   same class. Resource class attributes can be used to implement a   variety of policies. The key resources of interest here are links.   When applied to links, the resource class attribute effectively   becomes  an aspect of the "link state" parameters.   The concept of resource class attributes is a powerful abstraction.   From a Traffic Engineering perspective, it can be used to implement   many policies with regard to both traffic and resource oriented   performance optimization. Specifically, resource class attributes can   be used to:   1. Apply uniform policies to a set of resources that do not need      to be in the same topological region.   2. Specify the relative preference of sets of resources for      path placement of traffic trunks.   3. Explicitly restrict the placement of traffic trunks      to  specific subsets of resources.   4. Implement generalized inclusion / exclusion policies.   5. Enforce traffic locality containment policies. That is,      policies    that seek to contain local traffic within      specific topological regions of the network.   Additionally, resource class attributes can be used for   identification purposes.   In general, a resource can be assigned more than one resource class   attribute. For example, all of the OC-48 links in a given network may   be assigned a distinguished resource class attribute. The subsets of   OC-48 links which exist with a given abstraction domain of the   network may be assigned additional resource class attributes in order   to implement specific containment policies, or to architect the   network in a certain manner.7.0 Constraint-Based Routing   This section discusses the issues pertaining to constraint-based   routing in MPLS domains. In contemporary terminology, constraint-   based routing is often referred to as "QoS Routing" see [5,6,7,10].Awduche, et al.              Informational                     [Page 22]RFC 2702                MPLS Traffic Engineering          September 1999   This document uses the term "constraint-based routing" however,   because it better captures the functionality envisioned, which   generally encompasses QoS routing as a subset.   constraint-based routing enables a demand driven, resource   reservation aware, routing paradigm to co-exist with current topology   driven hop by hop Internet interior gateway protocols.   A constraint-based routing framework uses the following as input:    - The attributes associated with traffic trunks.    - The attributes associated with resources.    - Other topology state information.   Based on this information, a constraint-based routing process on each   node automatically computes explicit routes for each traffic trunk   originating from the node. In this case, an explicit route for each   traffic trunk is a specification of a label switched path that   satisfies the demand requirements expressed in the trunk's   attributes, subject to constraints imposed by resource availability,   administrative policy, and other topology state information.   A constraint-based routing framework can greatly reduce the level of   manual configuration and intervention required to actualize Traffic   Engineering policies.   In practice, the Traffic Engineer, an operator, or even an automaton   will specify the endpoints of a traffic trunk and assign a set of   attributes to the trunk which encapsulate the performance   expectations and behavioral characteristics of the trunk. The   constraint-based routing framework is then expected to find a   feasible path to satisfy the expectations.  If necessary, the Traffic   Engineer or a traffic engineering support system can then use   administratively configured explicit routes to perform fine grained   optimization.7.1 Basic Features of Constraint-Based Routing   A constraint-based routing framework should at least have the   capability to automatically obtain a basic feasible solution to the   traffic trunk path placement problem.   In general, the constraint-based routing problem is known to be   intractable for most realistic constraints. However, in practice, a   very simple well known heuristic (see e.g. [9]) can be used to find a   feasible path if one exists:Awduche, et al.              Informational                     [Page 23]RFC 2702                MPLS Traffic Engineering          September 1999    - First prune resources that do not satisfy the requirements of      the traffic trunk attributes.    - Next, run a shortest path algorithm on the residual graph.   Clearly, if a feasible path exists for a single traffic trunk, then   the above simple procedure will find it. Additional rules can be   specified to break ties and perform further optimizations.  In   general, ties should be broken so that congestion is minimized.  When   multiple traffic trunks are to be routed, however, it can be shown   that the above algorithm may not always find a mapping, even when a   feasible mapping exists.7.2 Implementation Considerations   Many commercial implementations of frame relay and ATM switches   already support some notion of constraint-based routing. For such   devices or for the novel MPLS centric contraptions devised therefrom,   it should be relatively easy to extend the current constraint-based   routing implementations to accommodate the peculiar requirements of   MPLS.   For routers that use topology driven hop by hop IGPs, constraint-   based routing can be incorporated in at least one of two ways:   1. By extending the current IGP protocols such as OSPF and IS-IS to      support constraint-based routing. Effort is already underway to      provide such extensions to OSPF (see [5,7]).   2. By adding a constraint-based routing process to each router which      can co-exist with current IGPs. This scenario is depicted      in Figure 1.         ------------------------------------------        |          Management Interface            |         ------------------------------------------            |                 |                 |     ------------     ------------------    --------------    |    MPLS    |<->| Constraint-Based |  | Conventional |    |            |   | Routing Process  |  | IGP Process  |     ------------     ------------------    --------------                           |                  |             -----------------------    --------------            | Resource  Attribute   |  | Link State   |            | Availability Database |  | Database     |             -----------------------    --------------    Figure 1. Constraint-Based Routing Process on Layer 3 LSRAwduche, et al.              Informational                     [Page 24]RFC 2702                MPLS Traffic Engineering          September 1999   There are many important details associated with implementing   constraint-based routing on Layer 3 devices which we do not discuss   here. These include the following:   - Mechanisms for exchange of topology state information     (resource availability information, link state information,     resource attribute information) between constraint-based     routing processes.   - Mechanisms for maintenance of topology state information.   - Interaction between constraint-based routing processes and     conventional IGP processes.   - Mechanisms to accommodate the adaptivity requirements of     traffic trunks.   - Mechanisms to accommodate the resilience and survivability     requirements of traffic trunks.   In summary, constraint-based routing assists in performance   optimization of operational networks by automatically finding   feasible paths that satisfy a set of constraints for traffic trunks.   It can drastically reduce the amount of administrative explicit path   configuration and manual intervention required to achieve Traffic   Engineering objectives.8.0 Conclusion   This manuscript presented a set of requirements for Traffic   Engineering over MPLS. Many capabilities were described aimed at   enhancing the applicability of MPLS to Traffic Engineering in the   Internet.   It should be noted that some of the issues described here can be   addressed by incorporating a minimal set of building blocks into   MPLS, and then using a network management superstructure to extend   the functionality in order to realize the requirements. Also, the   constraint-based routing framework does not have to be part of the   core MPLS specifications. However, MPLS does require some interaction   with a constraint-based routing framework in order to meet the   requirements.Awduche, et al.              Informational                     [Page 25]RFC 2702                MPLS Traffic Engineering          September 19999.0 Security Considerations   This document does not introduce new security issues beyond those   inherent in MPLS and may use the same mechanisms proposed for this   technology. It is, however, specifically important that manipulation   of administratively configurable parameters be executed in a secure   manner by authorized entities.10.0 References   [1]  Rosen, E., Viswanathan, A. and R. Callon, "A Proposed        Architecture for MPLS", Work in Progress.   [2]  Callon, R., Doolan, P., Feldman, N., Fredette, A., Swallow, G.        and A. Viswanathan, "A Framework for Multiprotocol Label        Switching", Work in Progress.   [3]  Li, T. and Y. Rekhter, "Provider Architecture for Differentiated        Services and Traffic Engineering (PASTE)", RFC 2430, October        1998.   [4]  Rekhter, Y., Davie, B., Katz, D., Rosen, E. and  G. Swallow,        "Cisco Systems' Tag Switching Architecture - Overview", RFC        2105, February 1997.   [5]  Zhang, Z., Sanchez, C., Salkewicz, B. and E. Crawley "Quality of        Service Extensions to OSPF", Work in Progress.   [6]  Crawley, E., Nair, F., Rajagopalan, B. and H. Sandick, "A        Framework for QoS Based Routing in the Internet", RFC 2386,        August 1998.   [7]  Guerin, R., Kamat, S., Orda, A., Przygienda, T. and D. Williams,        "QoS Routing Mechanisms and OSPF Extensions", RFC 2676, August        1999.   [8]  C. Yang and A. Reddy, "A Taxonomy for Congestion Control        Algorithms in Packet Switching Networks," IEEE Network Magazine,        Volume 9, Number 5, July/August 1995.   [9]  W. Lee, M. Hluchyi, and P. Humblet, "Routing Subject to Quality        of Service Constraints in Integrated Communication Networks,"        IEEE Network, July 1995, pp 46-55.   [10] ATM Forum, "Traffic Management Specification: Version 4.0" April        1996.Awduche, et al.              Informational                     [Page 26]RFC 2702                MPLS Traffic Engineering          September 199911.0 Acknowledgments   The authors would like to thank Yakov Rekhter for his review of an   earlier draft of this document. The authors would also like to thank   Louis Mamakos and 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -