rfc2211.txt

来自「中、英文RFC文档大全打包下载完全版 .」· 文本 代码 · 共 1,068 行 · 第 1/4 页

TXT
1,068
字号
   The third variable should be specifically evaluated using the   following procedure.     With no controlled-load flows in place, overload the network     element with best-effort traffic (as indicated by substantial     packet loss and queueing delay).     Execute requests for controlled-load service giving TSpecs with     increasingly large rate and burst parameters. If the request is     accepted, verify that traffic matching the TSpec is in fact handled     with characteristics closely approximating the unloaded     measurements taken above.     Repeat these experiments to determine the range of traffic     parameter (rate, burst size) values successfully handled by the     network element. The useful range of each parameter must be     determined for several settings of the other parameter, to map out     a two-dimensional "region" of successfully handled TSpecs. When     compared with network elements providing similar capabilities, this     region indicates the relative ability of the elements to provide     controlled-load service under high load. A larger region indicates     a higher evaluation rating.11. Examples of Implementation   One possible implementation of controlled-load service is to provide   a queueing mechanism with two priority levels; a high priority one   for controlled-load and a lower priority one for best effort service.   An admission control algorithm is used to limit the amount of traffic   placed into the high-priority queue. This algorithm may be based   either on the specified characteristics of the high-priority flows   (using information provided by the TSpecs), or on the measured   characteristics of the existing high-priority flows and the TSpec of   the new request.   Another possible implementation of controlled-load service is based   on the existing capabilities of network elements which supportWroclawski                 Standards Track                     [Page 15]RFC 2211                Controlled-Load Network           September 1997   "traffic classes" based on mechanisms such as weighted fair queueing   or class-based queueing [6]. In this case, it is sufficient to map   data flows accepted for controlled-load service into an existing   traffic class with adequate capacity to avoid overload. This   requirement is enforced by an admission control algorithm which   considers the characteristics of the traffic class, the   characteristics of the traffic already admitted to the class, and the   TSpec of the new flow requesting service. Again, the admission   control algorithm may be based either on the TSpec-specified or the   measured characteristics of the existing traffic.   A specific case of the above approach is to employ a scheduler which   implements weighted fair queueing or similar load-management scheme,   allocating a separate scheduling queue with correctly chosen weight   to each individual controlled-load flow.  In this circumstance, the   traffic scheduler also plays the role of the policing function, by   ensuring that nonconformant traffic arriving for one controlled-load   flow does not affect either other controlled-load flows or the best-   effort traffic. This elimination of mechanism is balanced by the   drawback that the approach does not benefit from any performance or   resource usage gain arising from statistical aggregation of several   flows into a single queueing class.   Admission control algorithms based on specified characteristics are   likely be appropriate when the number of flows in the high-priority   class is small, or the traffic characteristics of the flows appear   highly variable. In these situations the measured behavior of the   aggregate controlled-load traffic stream may not serve as an   effective predictor of future traffic, leading a measurement-based   admission control algorithm to produce incorrect results. Conversely,   in situations where the past behavior of the aggregate controlled-   load traffic *is* a good predictor of future behavior, a measurement-   based admission control algorithm may allow more traffic to be   admitted to the controlled-load service class with no degradation in   performance. An implementation may choose to switch between these two   approaches depending on the nature of the traffic stream at a given   time.   A variety of techniques may be used to provide the desired isolation   between excess (nonconformant) controlled-load traffic and other   best-effort traffic. Use of a low priority queue for nonconformant   controlled-load traffic is simple, but other approaches may provide   superior service or fit better into existing architectures.  Variants   of fair queueing or weighted fair queueing may be used to allocate a   percentage of the available resources to different best-effort   traffic classes. One approach would be to allocate each controlled-   load flow a a 1/N "fair share" percentage of the available best-Wroclawski                 Standards Track                     [Page 16]RFC 2211                Controlled-Load Network           September 1997   effort bandwidth for its excess traffic. An alternate approach would   be to provide a single WFQ resource class for all excess controlled-   load traffic.  Finally, alternate mechanisms such as RED [xxx] may be   used to provide the same overall function.12. Examples of Use   The controlled-load service may be used by any application which can   make use of best-effort service, but is best suited to those   applications which can usefully characterize their traffic   requirements.  Applications based on the transport of "continuous   media" data, such as digitized audio or video, are an important   example of this class.   The controlled-load service is not isochronous and does not provide   any explicit information about transmission delay. For this reason,   applications with end-to-end timing requirements, including the   continuous-media class mentioned above, provide an application-   specific timing recovery mechanism, similar or identical to the   mechanisms required when these applications use best-effort service.   A protocol useful to applications requiring this capability is the   IETF Real-Time Transport Protocol [2].   Load-sensitive applications may choose to request controlled-load   service whenever they are run. Alternatively, these applications may   monitor their own performance and request controlled-load service   from the network only when best-effort service is not providing   acceptable performance. The first strategy provides higher assurance   that the level of quality delivered to the user will not change over   the lifetime of an application session. The second strategy provides   greated flexibility and offers cost savings in environments where   levels of service above best-effort incur a charge.13. Security Considerations   A network element implementing the service described here is   intentionally and explicitly expected to give preferential treatment   to selected packet traffic. This memo does not describe the mechanism   used to indicate which traffic is to receive the preferential   treatment - rather, the controlled-load service described here may be   invoked by a number of mechanisms, including RSVP, SNMP network   management software, or proprietary control software. However, any   mechanism used to invoke the controlled load service must provide   security sufficient to guard against use of this preferential   treatment capability by undesired or unauthorized traffic.  A correct   implementation of the controlled-load service is *not* susceptable to   a denial-of-service attack based on maliciously requesting a very   small resource allocation for the attacked traffic flow. This isWroclawski                 Standards Track                     [Page 17]RFC 2211                Controlled-Load Network           September 1997   because the service specification requires that traffic in excess of   the requested level be carried on a best-effort basis, rather than   being dropped. This requirement is discussed further in Section 7 of   this memo.   Of necessity, giving preferential service to certain traffic flows   implies giving less service to other traffic flows.  Thus, it is   possible to conduct a denial of service attack by maliciously   reconfiguring the controlled-load "admission control algorithm" to   allow overallocation of available bandwidth or other forwarding   resources, starving non-controlled-load flows. In general, this is   unlikely to increase the network's vulnerability to attack, because   many other reconfigurations of a router or host can cause denial of   service. It is reasonable to assume that whatever means is used to   protect against other reconfiguration attacks will be adequate to   protect against this one as well.Appendix 1: Use of the Controlled-Load service with RSVP   The use of Controlled-Load service in conjunction with the RSVP   resource reservation setup protocol is specified in reference [4].   This document gives the format of RSVP FLOWSPEC, SENDER_TSPEC, and   ADSPEC objects needed to support applications desiring Controlled-   Load service and gives information about how RSVP processes those   objects. The RSVP protocol itself is specified in Reference [3].References   [1] Shenker, S., and J. Wroclawski. "Network Element Service   Specification Template", RFC 2216, September 1997.   [2] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson.   "RTP: A Transport Protocol for Real-Time Applications", RFC 1889,   January 1996.   [3] Braden, R., Ed., et. al., "Resource Reservation Protocol (RSVP) -   Version 1 Functional Specification", RFC 2205, September 1997.   [4] Wroclawski, J., "The use of RSVP with IETF Integrated Services",   RFC 2210, September 1997.   [5] Shenker, S., and J. Wroclawski, "General Characterization   Parameters for Integrated Service Network Elements", RFC 2215,   September 1997.Wroclawski                 Standards Track                     [Page 18]RFC 2211                Controlled-Load Network           September 1997   [6] S. Floyd, and V. Jacobson.  "Link-sharing and Resource Management   Models for Packet Networks," IEEE/ACM Transactions on Networking,   Vol. 3 No. 4, pp. 365-386, August 1995.   [7] A. K. J. Parekh. "A Generalized Processor Sharing Approach to   Flow Control in Integrated Service Networks". MIT Laboratory for   Information and Decision Systems, Report LIDS-TH-2089, February 1992Author's Address   John Wroclawski   MIT Laboratory for Computer Science   545 Technology Sq.   Cambridge, MA  02139   Phone: 617-253-7885   Fax:   617-253-2673 (FAX)   EMail: jtw@lcs.mit.eduWroclawski                 Standards Track                     [Page 19]

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?