draft-briscoe-re-pcn-border-cheat-00.txt | draft-briscoe-re-pcn-border-cheat-01.txt | |||
---|---|---|---|---|
PCN Working Group B. Briscoe | PCN Working Group B. Briscoe | |||
Internet-Draft BT & UCL | Internet-Draft BT & UCL | |||
Intended status: Informational June 30, 2007 | Intended status: Informational February 25, 2008 | |||
Expires: January 1, 2008 | Expires: August 28, 2008 | |||
Emulating Border Flow Policing using Re-ECN on Bulk Data | Emulating Border Flow Policing using Re-ECN on Bulk Data | |||
draft-briscoe-re-pcn-border-cheat-00 | draft-briscoe-re-pcn-border-cheat-01 | |||
Status of this Memo | Status of this Memo | |||
By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
skipping to change at page 1, line 34 | skipping to change at page 1, line 34 | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on January 1, 2008. | This Internet-Draft will expire on August 28, 2008. | |||
Copyright Notice | Copyright Notice | |||
Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2008). | |||
Abstract | Abstract | |||
Scaling per flow admission control to the Internet is a hard problem. | Scaling per flow admission control to the Internet is a hard problem. | |||
A recently proposed approach combines Diffserv and pre-congestion | A recently proposed approach combines Diffserv and pre-congestion | |||
notification (PCN) to provide a service slightly better than Intserv | notification (PCN) to provide a service slightly better than Intserv | |||
controlled load. It scales to networks of any size, but only if | controlled load. It scales to networks of any size, but only if | |||
domains trust each other to comply with admission control and rate | domains trust each other to comply with admission control and rate | |||
policing. This memo claims to solve this trust problem without | policing. This memo claims to solve this trust problem without | |||
losing scalability. It describes bulk border policing that provides | losing scalability. It describes bulk border policing that provides | |||
a sufficient emulation of per-flow policing with the help of another | a sufficient emulation of per-flow policing with the help of another | |||
recently proposed extension to ECN, involving re-echoing ECN feedback | recently proposed extension to ECN, involving re-echoing ECN feedback | |||
(re-ECN). With only passive bulk measurements at borders, sanctions | (re-ECN). With only passive bulk measurements at borders, sanctions | |||
can be applied against cheating networks. | can be applied against cheating networks. | |||
Table of Contents | ||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 7 | ||||
2. Requirements Notation . . . . . . . . . . . . . . . . . . . . 9 | ||||
3. The Problem . . . . . . . . . . . . . . . . . . . . . . . . . 10 | ||||
3.1. The Traditional Per-flow Policing Problem . . . . . . . . 10 | ||||
3.2. Generic Scenario . . . . . . . . . . . . . . . . . . . . . 12 | ||||
4. Re-ECN Protocol for an RSVP (or similar) Transport . . . . . . 14 | ||||
4.1. Protocol Overview . . . . . . . . . . . . . . . . . . . . 14 | ||||
4.2. Re-ECN Abstracted Network Layer Wire Protocol (IPv4 or | ||||
v6) . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 | ||||
4.2.1. Re-ECN Recap . . . . . . . . . . . . . . . . . . . . . 16 | ||||
4.2.2. Re-ECN Combined with Pre-Congestion Notification | ||||
(re-PCN) . . . . . . . . . . . . . . . . . . . . . . . 18 | ||||
4.3. Protocol Operation . . . . . . . . . . . . . . . . . . . . 20 | ||||
4.3.1. Protocol Operation for an Established Flow . . . . . . 20 | ||||
4.3.2. Aggregate Bootstrap . . . . . . . . . . . . . . . . . 21 | ||||
4.3.3. Flow Bootstrap . . . . . . . . . . . . . . . . . . . . 22 | ||||
4.3.4. Router Forwarding Behaviour . . . . . . . . . . . . . 23 | ||||
4.3.5. Extensions . . . . . . . . . . . . . . . . . . . . . . 25 | ||||
5. Emulating Border Policing with Re-ECN . . . . . . . . . . . . 25 | ||||
5.1. Informal Terminology . . . . . . . . . . . . . . . . . . . 25 | ||||
5.2. Policing Overview . . . . . . . . . . . . . . . . . . . . 26 | ||||
5.3. Pre-requisite Contractual Arrangements . . . . . . . . . . 28 | ||||
5.4. Emulation of Per-Flow Rate Policing: Rationale and | ||||
Limits . . . . . . . . . . . . . . . . . . . . . . . . . . 31 | ||||
5.5. Sanctioning Dishonest Marking . . . . . . . . . . . . . . 32 | ||||
5.6. Border Mechanisms . . . . . . . . . . . . . . . . . . . . 34 | ||||
5.6.1. Border Accounting Mechanisms . . . . . . . . . . . . . 34 | ||||
5.6.2. Competitive Routing . . . . . . . . . . . . . . . . . 38 | ||||
5.6.3. Fail-safes . . . . . . . . . . . . . . . . . . . . . . 39 | ||||
6. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 | ||||
7. Incremental Deployment . . . . . . . . . . . . . . . . . . . . 42 | ||||
8. Design Choices and Rationale . . . . . . . . . . . . . . . . . 43 | ||||
9. Security Considerations . . . . . . . . . . . . . . . . . . . 45 | ||||
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 46 | ||||
11. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 46 | ||||
12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 47 | ||||
13. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 47 | ||||
14. References . . . . . . . . . . . . . . . . . . . . . . . . . . 48 | ||||
14.1. Normative References . . . . . . . . . . . . . . . . . . . 48 | ||||
14.2. Informative References . . . . . . . . . . . . . . . . . . 48 | ||||
Appendix A. Implementation . . . . . . . . . . . . . . . . . . . 50 | ||||
A.1. Ingress Gateway Algorithm for Blanking the RE flag . . . . 50 | ||||
A.2. Downstream Congestion Metering Algorithms . . . . . . . . 51 | ||||
A.2.1. Bulk Downstream Congestion Metering Algorithm . . . . 51 | ||||
A.2.2. Inflation Factor for Persistently Negative Flows . . . 52 | ||||
A.3. Algorithm for Sanctioning Negative Traffic . . . . . . . . 52 | ||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 53 | ||||
Intellectual Property and Copyright Statements . . . . . . . . . . 54 | ||||
Status (to be removed by the RFC Editor) | Status (to be removed by the RFC Editor) | |||
This memo is posted as an Internet-Draft with the intent to | This memo is posted as an Internet-Draft with the intent to | |||
eventually be broken down in two documents; one for the standards | eventually be broken down in two documents; one for the standards | |||
track and one for informational status. But until it becomes an item | track and one for informational status. But until it becomes an item | |||
of IETF working group business the whole proposal has been kept | of IETF working group business the whole proposal has been kept | |||
together to aid understanding. Only the text of Section 4 of this | together to aid understanding. Only the text of Section 4 of this | |||
document requires standardisation. The rest of the sections describe | document requires standardisation. The rest of the sections describe | |||
how a system might be built from these protocols by the operators of | how a system might be built from these protocols by the operators of | |||
an internetwork. Note in particular that the policing and monitoring | an internetwork. Note in particular that the policing and monitoring | |||
functions proposed for the trust boundaries between operators would | functions proposed for the trust boundaries between operators would | |||
not need standardisation by the IETF. They simply represent one way | not need standardisation by the IETF. They simply represent one way | |||
that the proposed protocols could be used to extend the PCN | that the proposed protocols could be used to extend the PCN | |||
architecture [PCN-arch] to span multiple domains without mutual trust | architecture [I-D.ietf-pcn-architecture] to span multiple domains | |||
between the operators. | without mutual trust between the operators. | |||
To realise the system described, this document also depends on | To realise the system described, this document also depends on | |||
standardisation of three other documents currently being discussed | standardisation of three other documents currently being discussed | |||
(but not on the standards track) in the IETF Transport Area: pre- | (but not on the standards track) in the IETF Transport Area: pre- | |||
congestion notification (PCN) marking on interior nodes [PCN]; | congestion notification (PCN) marking on interior nodes [PCN]; | |||
feedback of aggregate PCN measurements by suitably extending the | feedback of aggregate PCN measurements by suitably extending the | |||
admission control signalling protocol (e.g. RSVP) [RSVP-ECN]; and | admission control signalling protocol (e.g. RSVP) [RSVP-ECN]; and | |||
re-insertion of the feedback into the forward stream of IP packets by | re-insertion of the feedback into the forward stream of IP packets by | |||
the PCN ingress gateway in a similar way to that proposed for a TCP | the PCN ingress gateway in a similar way to that proposed for a TCP | |||
source [Re-TCP]. | source [Re-TCP]. | |||
The authors seek comments from the Internet community on whether | The authors seek comments from the Internet community on whether | |||
combining PCN and re-ECN in this way is a sufficient solution to the | combining PCN and re-ECN in this way is a sufficient solution to the | |||
problem of scaling microflow admission control to the Internet as a | problem of scaling microflow admission control to the Internet as a | |||
whole, even though such scaling must take account of the increasing | whole, even though such scaling must take account of the increasing | |||
numbers of networks and users who may all have conflicting interests. | numbers of networks and users who may all have conflicting interests. | |||
Changes from previous drafts (to be removed by the RFC Editor) | Changes from previous drafts (to be removed by the RFC Editor) | |||
Changes in this version <draft-briscoe-re-pcn-border-cheat-00> | Full diffs of incremental changes between drafts are available at | |||
relative to the last <draft-briscoe-tsvwg-re-ecn-border-cheat-01>: | URL: <http://www.cs.ucl.ac.uk/staff/B.Briscoe/pubs.html#repcn> | |||
Changes from <draft-briscoe-re-pcn-border-cheat-00> to | ||||
<draft-briscoe-re-pcn-border-cheat-01> (current version): | ||||
Updated references. | ||||
Changes from <draft-briscoe-tsvwg-re-ecn-border-cheat-01> | ||||
to <draft-briscoe-re-pcn-border-cheat-00>: | ||||
Changed filename to associate it with the new IETF PCN w-g, rather | Changed filename to associate it with the new IETF PCN w-g, rather | |||
than the TSVWG w-g. | than the TSVWG w-g. | |||
Introduction: Clarified that bulk policing only replaces per-flow | Introduction: Clarified that bulk policing only replaces per-flow | |||
policing at interior inter-domain borders, while per-flow policing | policing at interior inter-domain borders, while per-flow policing | |||
is still needed at the access interface to the internetwork. Also | is still needed at the access interface to the internetwork. Also | |||
clarified that the aim is to neutralise any gains from cheating | clarified that the aim is to neutralise any gains from cheating | |||
using local bilateral contracts between neighbouring networks, | using local bilateral contracts between neighbouring networks, | |||
rather than merely identifying remote cheaters. | rather than merely identifying remote cheaters. | |||
skipping to change at page 3, line 28 | skipping to change at page 6, line 36 | |||
Clarified that "Designing in security from the start" merely means | Clarified that "Designing in security from the start" merely means | |||
allowing codepoint space in the PCN protocol encoding. There is | allowing codepoint space in the PCN protocol encoding. There is | |||
no need to actually implement inter-domain security mechanisms for | no need to actually implement inter-domain security mechanisms for | |||
solutions confined to a single domain. | solutions confined to a single domain. | |||
Updated some references and added a ref to the Security | Updated some references and added a ref to the Security | |||
Considerations, as well as other minor corrections and | Considerations, as well as other minor corrections and | |||
improvements. | improvements. | |||
Changes from <draft-briscoe-tsvwg-re-ecn-border-cheat-00 to | Changes from <draft-briscoe-tsvwg-re-ecn-border-cheat-00> to | |||
<draft-briscoe-tsvwg-re-ecn-border-cheat-01>: | <draft-briscoe-tsvwg-re-ecn-border-cheat-01>: | |||
Added subsection on Border Accounting Mechanisms (Section 5.6.1) | Added subsection on Border Accounting Mechanisms (Section 5.6.1) | |||
Section 4.2 on the re-ECN wire protocol clarified and re-organised | Section 4.2 on the re-ECN wire protocol clarified and re-organised | |||
to separately discuss re-ECN for default ECN marking and for pre- | to separately discuss re-ECN for default ECN marking and for pre- | |||
congestion marking (PCN). | congestion marking (PCN). | |||
Router Forwarding Behaviour subsection added to re-organised | Router Forwarding Behaviour subsection added to re-organised | |||
section on Protocol Operation (Section 4.3). Extensions section | section on Protocol Operation (Section 4.3). Extensions section | |||
skipping to change at page 5, line 5 | skipping to change at page 7, line 17 | |||
Added section on Incremental Deployment (Section 7), drawing | Added section on Incremental Deployment (Section 7), drawing | |||
together relevant points about deployment made throughout. | together relevant points about deployment made throughout. | |||
Sections on Design Rationale (Section 8) and Security | Sections on Design Rationale (Section 8) and Security | |||
Considerations (Section 9) expanded with some new material, | Considerations (Section 9) expanded with some new material, | |||
including new attacks and their defences. | including new attacks and their defences. | |||
Suggested Border Metering Algorithms improved (Appendix A.2) for | Suggested Border Metering Algorithms improved (Appendix A.2) for | |||
resilience to newly identified attacks. | resilience to newly identified attacks. | |||
Table of Contents | ||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 7 | ||||
2. Requirements Notation . . . . . . . . . . . . . . . . . . . . 9 | ||||
3. The Problem . . . . . . . . . . . . . . . . . . . . . . . . . 9 | ||||
3.1. The Traditional Per-flow Policing Problem . . . . . . . . 9 | ||||
3.2. Generic Scenario . . . . . . . . . . . . . . . . . . . . . 11 | ||||
4. Re-ECN Protocol for an RSVP (or similar) Transport . . . . . . 14 | ||||
4.1. Protocol Overview . . . . . . . . . . . . . . . . . . . . 14 | ||||
4.2. Re-ECN Abstracted Network Layer Wire Protocol (IPv4 or | ||||
v6) . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 | ||||
4.2.1. Re-ECN Recap . . . . . . . . . . . . . . . . . . . . . 16 | ||||
4.2.2. Re-ECN Combined with Pre-Congestion Notification | ||||
(re-PCN) . . . . . . . . . . . . . . . . . . . . . . . 17 | ||||
4.3. Protocol Operation . . . . . . . . . . . . . . . . . . . . 19 | ||||
4.3.1. Protocol Operation for an Established Flow . . . . . . 19 | ||||
4.3.2. Aggregate Bootstrap . . . . . . . . . . . . . . . . . 21 | ||||
4.3.3. Flow Bootstrap . . . . . . . . . . . . . . . . . . . . 22 | ||||
4.3.4. Router Forwarding Behaviour . . . . . . . . . . . . . 23 | ||||
4.3.5. Extensions . . . . . . . . . . . . . . . . . . . . . . 24 | ||||
5. Emulating Border Policing with Re-ECN . . . . . . . . . . . . 24 | ||||
5.1. Informal Terminology . . . . . . . . . . . . . . . . . . . 25 | ||||
5.2. Policing Overview . . . . . . . . . . . . . . . . . . . . 26 | ||||
5.3. Pre-requisite Contractual Arrangements . . . . . . . . . . 28 | ||||
5.4. Emulation of Per-Flow Rate Policing: Rationale and | ||||
Limits . . . . . . . . . . . . . . . . . . . . . . . . . . 31 | ||||
5.5. Sanctioning Dishonest Marking . . . . . . . . . . . . . . 32 | ||||
5.6. Border Mechanisms . . . . . . . . . . . . . . . . . . . . 34 | ||||
5.6.1. Border Accounting Mechanisms . . . . . . . . . . . . . 34 | ||||
5.6.2. Competitive Routing . . . . . . . . . . . . . . . . . 38 | ||||
5.6.3. Fail-safes . . . . . . . . . . . . . . . . . . . . . . 39 | ||||
6. Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 | ||||
7. Incremental Deployment . . . . . . . . . . . . . . . . . . . . 42 | ||||
8. Design Choices and Rationale . . . . . . . . . . . . . . . . . 43 | ||||
9. Security Considerations . . . . . . . . . . . . . . . . . . . 45 | ||||
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 46 | ||||
11. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 46 | ||||
12. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 47 | ||||
13. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 47 | ||||
14. References . . . . . . . . . . . . . . . . . . . . . . . . . . 48 | ||||
14.1. Normative References . . . . . . . . . . . . . . . . . . . 48 | ||||
14.2. Informative References . . . . . . . . . . . . . . . . . . 48 | ||||
Appendix A. Implementation . . . . . . . . . . . . . . . . . . . 50 | ||||
A.1. Ingress Gateway Algorithm for Blanking the RE flag . . . . 50 | ||||
A.2. Downstream Congestion Metering Algorithms . . . . . . . . 51 | ||||
A.2.1. Bulk Downstream Congestion Metering Algorithm . . . . 51 | ||||
A.2.2. Inflation Factor for Persistently Negative Flows . . . 52 | ||||
A.3. Algorithm for Sanctioning Negative Traffic . . . . . . . . 52 | ||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 53 | ||||
Intellectual Property and Copyright Statements . . . . . . . . . . 54 | ||||
1. Introduction | 1. Introduction | |||
The Internet community largely lost interest in the Intserv | The Internet community largely lost interest in the Intserv | |||
architecture after it was clarified that it would be unlikely to | architecture after it was clarified that it would be unlikely to | |||
scale to the whole Internet [RFC2208]. Although Intserv mechanisms | scale to the whole Internet [RFC2208]. Although Intserv mechanisms | |||
proved impractical, the bandwidth reservation service it aimed to | proved impractical, the bandwidth reservation service it aimed to | |||
offer is still very much required. | offer is still very much required. | |||
A recently proposed approach [PCN-arch] combines Diffserv and pre- | A recently proposed approach [I-D.ietf-pcn-architecture] combines | |||
congestion notification (PCN) to provide a service slightly better | Diffserv and pre-congestion notification (PCN) to provide a service | |||
than Intserv controlled load [RFC2211]. It scales to any size | slightly better than Intserv controlled load [RFC2211]. It scales to | |||
network, but only if domains trust their neighbours to have checked | any size network, but only if domains trust their neighbours to have | |||
that upstream customers aren't taking more bandwidth than they | checked that upstream customers aren't taking more bandwidth than | |||
reserved, either accidentally or deliberately. This memo describes | they reserved, either accidentally or deliberately. This memo | |||
border policing measures so that one network can protect its | describes border policing measures so that one network can protect | |||
interests, even if networks around it are deliberately trying to | its interests, even if networks around it are deliberately trying to | |||
cheat. The approach provides a sufficient emulation of flow rate | cheat. The approach provides a sufficient emulation of flow rate | |||
policing at trust boundaries but without per-flow processing. The | policing at trust boundaries but without per-flow processing. The | |||
emulation is not perfect, but it is sufficient to ensure that the | emulation is not perfect, but it is sufficient to ensure that the | |||
punishment is at least proportionate to the severity of the cheat. | punishment is at least proportionate to the severity of the cheat. | |||
Per-flow rate policing for each reservation is still expected to be | Per-flow rate policing for each reservation is still expected to be | |||
used at the access edge of the internetwork, but at the borders | used at the access edge of the internetwork, but at the borders | |||
between networks bulk policing can be used to emulate per-flow | between networks bulk policing can be used to emulate per-flow | |||
policing. | policing. | |||
The aim is to be able to scale controlled load service to any number | The aim is to be able to scale controlled load service to any number | |||
of endpoints, even though such scaling must take account of the | of endpoints, even though such scaling must take account of the | |||
increasing numbers of networks and users who may all have conflicting | increasing numbers of networks and users who may all have conflicting | |||
interests. To achieve such scaling, this memo combines two recent | interests. To achieve such scaling, this memo combines two recent | |||
proposals, both of which it briefly recaps: | proposals, both of which it briefly recaps: | |||
o A deployment model for admission control over Diffserv using pre- | o A deployment model for admission control over Diffserv using pre- | |||
congestion notification [PCN-arch] describes how bulk pre- | congestion notification [I-D.ietf-pcn-architecture] describes how | |||
congestion notification on routers within an edge-to-edge Diffserv | bulk pre-congestion notification on routers within an edge-to-edge | |||
region can emulate the precision of per-flow admission control to | Diffserv region can emulate the precision of per-flow admission | |||
provide controlled load service without unscalable per-flow | control to provide controlled load service without unscalable per- | |||
processing; | flow processing; | |||
o Re-ECN: Adding Accountability to TCP/IP [Re-TCP]. The trick that | o Re-ECN: Adding Accountability to TCP/IP [Re-TCP]. The trick that | |||
addresses cheating at borders is to recognise that border policing | addresses cheating at borders is to recognise that border policing | |||
is mainly necessary because cheating upstream networks will admit | is mainly necessary because cheating upstream networks will admit | |||
traffic when they shouldn't only as long as they don't directly | traffic when they shouldn't only as long as they don't directly | |||
experience the downstream congestion their misbehaviour can cause. | experience the downstream congestion their misbehaviour can cause. | |||
The re-ECN protocol requires upstream nodes to declare expected | The re-ECN protocol requires upstream nodes to declare expected | |||
downstream congestion in all forwarded packets and it makes it in | downstream congestion in all forwarded packets and it makes it in | |||
their interests to declare it honestly. Operators can then | their interests to declare it honestly. Operators can then | |||
monitor downstream congestion in bulk at borders to emulate | monitor downstream congestion in bulk at borders to emulate | |||
skipping to change at page 8, line 24 | skipping to change at page 8, line 38 | |||
on the local bilateral contractual relationships that already exist | on the local bilateral contractual relationships that already exist | |||
between neighbouring networks. | between neighbouring networks. | |||
Rather than the end-to-end arrangement used when re-ECN was specified | Rather than the end-to-end arrangement used when re-ECN was specified | |||
for the TCP transport [Re-TCP], this memo specifies re-ECN in an | for the TCP transport [Re-TCP], this memo specifies re-ECN in an | |||
edge-to-edge arrangement, making it applicable to the above | edge-to-edge arrangement, making it applicable to the above | |||
deployment model for admission control over Diffserv. Also, rather | deployment model for admission control over Diffserv. Also, rather | |||
than using a TCP transport for regular congestion feedback, this memo | than using a TCP transport for regular congestion feedback, this memo | |||
specifies re-ECN using RSVP as the transport for feedback [RSVP-ECN]. | specifies re-ECN using RSVP as the transport for feedback [RSVP-ECN]. | |||
A similar deployment model, but with a different transport for | A similar deployment model, but with a different transport for | |||
signalling congestion feedback could be used (e.g. RMD [NSIS-RMD] | signalling congestion feedback could be used (e.g. Arumaithurai | |||
uses NSIS). | [I-D.arumaithurai-nsis-pcn] and RMD [I-D.ietf-nsis-rmd] use NSIS). | |||
This memo aims to do two things: i) define how to apply the re-ECN | This memo aims to do two things: i) define how to apply the re-ECN | |||
protocol to the admission control over Diffserv scenario; and ii) | protocol to the admission control over Diffserv scenario; and ii) | |||
explain why re-ECN sufficiently emulates border policing in that | explain why re-ECN sufficiently emulates border policing in that | |||
scenario. Most of the memo is taken up with the second aim; | scenario. Most of the memo is taken up with the second aim; | |||
explaining why it works. Applying re-ECN to the scenario actually | explaining why it works. Applying re-ECN to the scenario actually | |||
involves quite a trivial modification to the ingress gateway. That | involves quite a trivial modification to the ingress gateway. That | |||
modification can be added to gateways later, so our immediate goal is | modification can be added to gateways later, so our immediate goal is | |||
to convince everyone to have the foresight to define the PCN wire | to convince everyone to have the foresight to define the PCN wire | |||
protocol encoding to accommodate the extended codepoints defined in | protocol encoding to accommodate the extended codepoints defined in | |||
skipping to change at page 12, line 45 | skipping to change at page 13, line 9 | |||
Within the Diffserv region are three interior domains, A, B and C, as | Within the Diffserv region are three interior domains, A, B and C, as | |||
well as the inward facing interfaces of the ingress and egress | well as the inward facing interfaces of the ingress and egress | |||
gateways. An ingress and egress border router (BR) is shown | gateways. An ingress and egress border router (BR) is shown | |||
interconnecting each interior domain with the next. There may be | interconnecting each interior domain with the next. There may be | |||
other interior routers (not shown) within each interior domain. | other interior routers (not shown) within each interior domain. | |||
In two paragraphs we now briefly recap how pre-congestion | In two paragraphs we now briefly recap how pre-congestion | |||
notification is intended to be used to control flow admission to a | notification is intended to be used to control flow admission to a | |||
large Diffserv region. The first paragraph describes data plane | large Diffserv region. The first paragraph describes data plane | |||
functions and the second describes signalling in the control plane. | functions and the second describes signalling in the control plane. | |||
We omit many details from [PCN-arch] including behaviour during | We omit many details from [I-D.ietf-pcn-architecture] including | |||
routing changes. For brevity here we assume other flows are already | behaviour during routing changes. For brevity here we assume other | |||
in progress across a path through the Diffserv region before a new | flows are already in progress across a path through the Diffserv | |||
one arrives, but how bootstrap works is described in Section 4.3.2. | region before a new one arrives, but how bootstrap works is described | |||
in Section 4.3.2. | ||||
Figure 1 shows a single simplex reserved flow from the sending (Sx) | Figure 1 shows a single simplex reserved flow from the sending (Sx) | |||
end host to the receiving (Rx) end host. The ingress gateway polices | end host to the receiving (Rx) end host. The ingress gateway polices | |||
incoming traffic within its admitted reservation and remarks it to | incoming traffic within its admitted reservation and remarks it to | |||
turn on an ECN-capable codepoint [RFC3168] and the controlled load | turn on an ECN-capable codepoint [RFC3168] and the controlled load | |||
(CL) Diffserv codepoint. Together, these codepoints define which | (CL) Diffserv codepoint. Together, these codepoints define which | |||
traffic is entitled to the enhanced scheduling of the CL behaviour | traffic is entitled to the enhanced scheduling of the CL behaviour | |||
aggregate on routers within the Diffserv region. The CL PHB of | aggregate on routers within the Diffserv region. The CL PHB of | |||
interior routers consists of a scheduling behaviour and a new ECN | interior routers consists of a scheduling behaviour and a new ECN | |||
marking behaviour that we call `pre-congestion notification' [PCN]. | marking behaviour that we call `pre-congestion notification' [PCN]. | |||
skipping to change at page 16, line 30 | skipping to change at page 17, line 9 | |||
re-ECN. | re-ECN. | |||
Note that general-purpose routers do not have to read the RE flag, | Note that general-purpose routers do not have to read the RE flag, | |||
only special policing elements at borders do. And no general-purpose | only special policing elements at borders do. And no general-purpose | |||
routers have to change the RE flag, although the ingress and egress | routers have to change the RE flag, although the ingress and egress | |||
gateways do because in the edge-to-edge deployment model we are | gateways do because in the edge-to-edge deployment model we are | |||
using, they act as proxies for the endpoints. Therefore the RE flag | using, they act as proxies for the endpoints. Therefore the RE flag | |||
does not even have to be visible to interior routers. So the RE flag | does not even have to be visible to interior routers. So the RE flag | |||
has no implications on protocols like MPLS. Congested label | has no implications on protocols like MPLS. Congested label | |||
switching routers (LSRs) would have to be able to notify their | switching routers (LSRs) would have to be able to notify their | |||
congestion with an ECN/PCN codepoint in the MPLS shim [ECN-MPLS], but | congestion with an ECN/PCN codepoint in the MPLS shim [RFC5129], but | |||
like any interior IP router, they can be oblivious to the RE flag, | like any interior IP router, they can be oblivious to the RE flag, | |||
which need only be read by border policing functions. | which need only be read by border policing functions. | |||
Although the RE flag is a separate, single bit field, it can be read | Although the RE flag is a separate, single bit field, it can be read | |||
as an extension to the two-bit ECN field; the three concatenated bits | as an extension to the two-bit ECN field; the three concatenated bits | |||
in what we will call the extended ECN field (EECN) make eight | in what we will call the extended ECN field (EECN) make eight | |||
codepoints available. When the RE flag setting is "don't care", we | codepoints available. When the RE flag setting is "don't care", we | |||
use the RFC3168 names of the ECN codepoints, but [Re-TCP] proposes | use the RFC3168 names of the ECN codepoints, but [Re-TCP] proposes | |||
the following six codepoint names for when there is a need to be more | the following six codepoint names for when there is a need to be more | |||
specific. | specific. | |||
skipping to change at page 19, line 40 | skipping to change at page 20, line 12 | |||
Table 2: Extended ECN Codepoints if the Diffserv codepoint uses Pre- | Table 2: Extended ECN Codepoints if the Diffserv codepoint uses Pre- | |||
congestion Notification (PCN) | congestion Notification (PCN) | |||
4.3. Protocol Operation | 4.3. Protocol Operation | |||
4.3.1. Protocol Operation for an Established Flow | 4.3.1. Protocol Operation for an Established Flow | |||
The re-ECN protocol involves a simple tweak to the action of the | The re-ECN protocol involves a simple tweak to the action of the | |||
gateway at the ingress edge of the CL region. In the deployment | gateway at the ingress edge of the CL region. In the deployment | |||
model just described [PCN-arch], for each active traffic aggregate | model just described [I-D.ietf-pcn-architecture], for each active | |||
across the CL region (CL-region-aggregate) the ingress gateway will | traffic aggregate across the CL region (CL-region-aggregate) the | |||
hold a fairly recent Congestion-Level-Estimate that the egress | ingress gateway will hold a fairly recent Congestion-Level-Estimate | |||
gateway will have fed back to it, piggybacked on the signalling that | that the egress gateway will have fed back to it, piggybacked on the | |||
sets up each flow. For instance, one aggregate might have been | signalling that sets up each flow. For instance, one aggregate might | |||
experiencing 3% pre-congestion (that is, congestion marked octets | have been experiencing 3% pre-congestion (that is, congestion marked | |||
whether Admission Marked or Pre-emption Marked). In this case, the | octets whether Admission Marked or Pre-emption Marked). In this | |||
ingress gateway MUST clear the RE flag to "0" for the same percentage | case, the ingress gateway MUST clear the RE flag to "0" for the same | |||
of octets of CL-packets (3%) and set it to "1" in the rest (97%). | percentage of octets of CL-packets (3%) and set it to "1" in the rest | |||
Appendix A.1 gives a simple pseudo-code algorithm that the ingress | (97%). Appendix A.1 gives a simple pseudo-code algorithm that the | |||
gateway may use to do this. | ingress gateway may use to do this. | |||
The RE flag is set and cleared this way round for incremental | The RE flag is set and cleared this way round for incremental | |||
deployment reasons (see [Re-TCP]). To avoid confusion we will use | deployment reasons (see [Re-TCP]). To avoid confusion we will use | |||
the term `blanking' (rather than marking) when the RE flag is cleared | the term `blanking' (rather than marking) when the RE flag is cleared | |||
to "0", so we will talk of the `RE blanking fraction' as the fraction | to "0", so we will talk of the `RE blanking fraction' as the fraction | |||
of octets with the RE flag cleared to "0". | of octets with the RE flag cleared to "0". | |||
^ | ^ | |||
| | | | |||
| RE blanking fraction | | RE blanking fraction | |||
skipping to change at page 21, line 30 | skipping to change at page 21, line 51 | |||
4.3.2. Aggregate Bootstrap | 4.3.2. Aggregate Bootstrap | |||
When a new reservation PATH message arrives at the egress, if there | When a new reservation PATH message arrives at the egress, if there | |||
are currently no flows in progress from the same ingress, there will | are currently no flows in progress from the same ingress, there will | |||
be no state maintaining the current level of pre-congestion marking | be no state maintaining the current level of pre-congestion marking | |||
for the aggregate. While the reservation signalling continues onward | for the aggregate. While the reservation signalling continues onward | |||
towards the receiving host, the egress gateway returns an RSVP | towards the receiving host, the egress gateway returns an RSVP | |||
message to the ingress with a flag [RSVP-ECN] asking the ingress to | message to the ingress with a flag [RSVP-ECN] asking the ingress to | |||
send a specified number of data probes between them. This bootstrap | send a specified number of data probes between them. This bootstrap | |||
behaviour is all described in the deployment model [PCN-arch]. | behaviour is all described in the deployment | |||
model [I-D.ietf-pcn-architecture]. | ||||
However, with our new re-ECN scheme, the ingress does not know what | However, with our new re-ECN scheme, the ingress does not know what | |||
proportion of the data probes should have the RE flag blanked, | proportion of the data probes should have the RE flag blanked, | |||
because it has no estimate yet of pre-congestion for the path across | because it has no estimate yet of pre-congestion for the path across | |||
the Diffserv region. | the Diffserv region. | |||
To be conservative, following the guidance for specifying other re- | To be conservative, following the guidance for specifying other re- | |||
ECN transports in [Re-TCP], the ingress SHOULD set the FNE codepoint | ECN transports in [Re-TCP], the ingress SHOULD set the FNE codepoint | |||
of the extended ECN header in all probe packets (Table 2). As per | of the extended ECN header in all probe packets (Table 2). As per | |||
the deployment model, the egress gateway measures the fraction of | the deployment model, the egress gateway measures the fraction of | |||
skipping to change at page 24, line 30 | skipping to change at page 25, line 6 | |||
understand drop, not congestion marking. But a PCN-capable router | understand drop, not congestion marking. But a PCN-capable router | |||
can mark rather than drop an FNE packet, even though its ECN field | can mark rather than drop an FNE packet, even though its ECN field | |||
when looked at in isolation is '00' which appears to be a legacy | when looked at in isolation is '00' which appears to be a legacy | |||
Not-ECT packet. Therefore, if a packet's RE flag is '1', even if | Not-ECT packet. Therefore, if a packet's RE flag is '1', even if | |||
its ECN field is '00', a PCN-enabled router SHOULD use congestion | its ECN field is '00', a PCN-enabled router SHOULD use congestion | |||
marking. This allows the `feedback not established' (FNE) | marking. This allows the `feedback not established' (FNE) | |||
codepoint to be used for probe packets, in order to pick up PCN | codepoint to be used for probe packets, in order to pick up PCN | |||
marking when bootstrapping an aggregate. | marking when bootstrapping an aggregate. | |||
ECN marking rather than dropping of FNE packets MUST only be | ECN marking rather than dropping of FNE packets MUST only be | |||
deployed in controlled environments, such as that in [PCN-arch], | deployed in controlled environments, such as that in | |||
where the presence of an egress node that understands ECN marking | [I-D.ietf-pcn-architecture], where the presence of an egress node | |||
is assured. Congestion events might otherwise be ignored if the | that understands ECN marking is assured. Congestion events might | |||
receiver only understands drop, rather than ECN marking. This is | otherwise be ignored if the receiver only understands drop, rather | |||
because there is no guarantee that ECN capability has been | than ECN marking. This is because there is no guarantee that ECN | |||
negotiated if feedback is not established (FNE). Also, [Re-TCP] | capability has been negotiated if feedback is not established | |||
places the strong condition that a router MUST apply drop rather | (FNE). Also, [Re-TCP] places the strong condition that a router | |||
than marking to FNE packets unless it can guarantee that FNE | MUST apply drop rather than marking to FNE packets unless it can | |||
packets are rate limited either locally or upstream. | guarantee that FNE packets are rate limited either locally or | |||
upstream. | ||||
4.3.5. Extensions | 4.3.5. Extensions | |||
If a different signalling system, such as NSIS, were used, but it | If a different signalling system, such as NSIS, were used, but it | |||
provided admission control in a similar way, using pre-congestion | provided admission control in a similar way, using pre-congestion | |||
notification (e.g. with RMD [NSIS-RMD]) we believe re-ECN could be | notification (e.g. Arumaithurai [I-D.arumaithurai-nsis-pcn] or | |||
used to protect against misbehaving networks in the same way as | RMD [I-D.ietf-nsis-rmd]) we believe re-ECN could be used to protect | |||
proposed above. | against misbehaving networks in the same way as proposed above. | |||
5. Emulating Border Policing with Re-ECN | 5. Emulating Border Policing with Re-ECN | |||
Note that the re-ECN protocol described in Section 4 above would | Note that the re-ECN protocol described in Section 4 above would | |||
require standardisation, whereas operators acting in their own | require standardisation, whereas operators acting in their own | |||
interests would be expected to deploy policing and monitoring | interests would be expected to deploy policing and monitoring | |||
functions similar to those proposed in the sections below without any | functions similar to those proposed in the sections below without any | |||
further need for standardisation by the IETF. Flexibility is | further need for standardisation by the IETF. Flexibility is | |||
expected in exactly how policing and monitoring is done. | expected in exactly how policing and monitoring is done. | |||
skipping to change at page 46, line 43 | skipping to change at page 46, line 43 | |||
10. IANA Considerations | 10. IANA Considerations | |||
This memo includes no request to IANA. | This memo includes no request to IANA. | |||
11. Conclusions | 11. Conclusions | |||
This memo builds on a promising technique to solve the classic | This memo builds on a promising technique to solve the classic | |||
problem of making flow admission control scale to any size network. | problem of making flow admission control scale to any size network. | |||
It involves the use of Diffserv in a deployment model that uses pre- | It involves the use of Diffserv in a deployment model that uses pre- | |||
congestion notification feedback to control admission into a network | congestion notification feedback to control admission into a network | |||
path [PCN-arch]. However as it stands, that deployment model depends | path [I-D.ietf-pcn-architecture]. However as it stands, that | |||
on all network domains trusting each other to comply with the | deployment model depends on all network domains trusting each other | |||
protocols, invoking admission control and flow pre-emption when | to comply with the protocols, invoking admission control and flow | |||
requested. | pre-emption when requested. | |||
We propose that the congestion feedback used in that deployment model | We propose that the congestion feedback used in that deployment model | |||
should be re-echoed into the forward data path, by making a trivial | should be re-echoed into the forward data path, by making a trivial | |||
modification to the ingress gateway. We then explain how the | modification to the ingress gateway. We then explain how the | |||
resulting downstream pre-congestion metric in packets can be | resulting downstream pre-congestion metric in packets can be | |||
monitored in bulk at borders to sufficiently emulate flow rate | monitored in bulk at borders to sufficiently emulate flow rate | |||
policing. | policing. | |||
We claim the result of combining these two approaches is an admission | We claim the result of combining these two approaches is an admission | |||
control system that scales to any size network _and_ any number of | control system that scales to any size network _and_ any number of | |||
skipping to change at page 47, line 42 | skipping to change at page 47, line 42 | |||
(UCL), Francois Le Faucheur, Anna Charny (Cisco), Jozef Babiarz, | (UCL), Francois Le Faucheur, Anna Charny (Cisco), Jozef Babiarz, | |||
Kwok-Ho Chan, Corey Alexander (Nortel), David Clark, Bill Lehr, | Kwok-Ho Chan, Corey Alexander (Nortel), David Clark, Bill Lehr, | |||
Sharon Gillett, Steve Bauer (MIT) (who publicised various dummy | Sharon Gillett, Steve Bauer (MIT) (who publicised various dummy | |||
traffic attacks), Sally Floyd (ICIR) and comments from participants | traffic attacks), Sally Floyd (ICIR) and comments from participants | |||
in the CFP/CRN Inter-Provider QoS, Broadband and DoS-Resistant | in the CFP/CRN Inter-Provider QoS, Broadband and DoS-Resistant | |||
Internet working groups. | Internet working groups. | |||
13. Comments Solicited | 13. Comments Solicited | |||
Comments and questions are encouraged and very welcome. They can be | Comments and questions are encouraged and very welcome. They can be | |||
addressed to the IETF Transport Area working group's mailing list | addressed to the IETF Congestion and Pre-Congestion Notification | |||
<tsvwg@ietf.org>, and/or to the authors. | working group's mailing list <pcn@ietf.org>, and/or to the author(s). | |||
14. References | 14. References | |||
14.1. Normative References | 14.1. Normative References | |||
[PCN] Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur, F., | [PCN] Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur, F., | |||
Charny, A., Liatsos, V., Babiarz, J., Chan, K., Dudley, | Charny, A., Liatsos, V., Babiarz, J., Chan, K., Dudley, | |||
S., Westberg, L., Bader, A., and G. Karagiannis, "Pre- | S., Westberg, L., Bader, A., and G. Karagiannis, "Pre- | |||
Congestion Notification Marking", | Congestion Notification Marking", | |||
draft-briscoe-tsvwg-cl-phb-03 (work in progress), | draft-briscoe-tsvwg-cl-phb-03 (work in progress), | |||
skipping to change at page 48, line 36 | skipping to change at page 48, line 36 | |||
Stiliadis, "An Expedited Forwarding PHB (Per-Hop | Stiliadis, "An Expedited Forwarding PHB (Per-Hop | |||
Behavior)", RFC 3246, March 2002. | Behavior)", RFC 3246, March 2002. | |||
[RSVP-ECN] | [RSVP-ECN] | |||
Le Faucheur, F., Charny, A., Briscoe, B., Eardley, P., | Le Faucheur, F., Charny, A., Briscoe, B., Eardley, P., | |||
Babiarz, J., and K. Chan, "RSVP Extensions for Admission | Babiarz, J., and K. Chan, "RSVP Extensions for Admission | |||
Control over Diffserv using Pre-congestion Notification", | Control over Diffserv using Pre-congestion Notification", | |||
draft-lefaucheur-rsvp-ecn-01 (work in progress), | draft-lefaucheur-rsvp-ecn-01 (work in progress), | |||
June 2006. | June 2006. | |||
[Re-TCP] Briscoe, B., Jacquet, A., Salvatori, A., and M. Koyabi, | [Re-TCP] Briscoe, B., Jacquet, A., Moncaster, T., and A. Smith, | |||
"Re-ECN: Adding Accountability for Causing Congestion to | "Re-ECN: Adding Accountability for Causing Congestion to | |||
TCP/IP", draft-briscoe-tsvwg-re-ecn-tcp-04 (work in | TCP/IP", draft-briscoe-tsvwg-re-ecn-tcp-05 (work in | |||
progress), June 2007. | progress), January 2008. | |||
14.2. Informative References | 14.2. Informative References | |||
[CLoop_pol] | [CLoop_pol] | |||
Salvatori, A., "Closed Loop Traffic Policing", Politecnico | Salvatori, A., "Closed Loop Traffic Policing", Politecnico | |||
Torino and Institut Eurecom Masters Thesis , | Torino and Institut Eurecom Masters Thesis , | |||
September 2005. | September 2005. | |||
[ECN-BGP] Mortier, R. and I. Pratt, "Incentive Based Inter-Domain | [ECN-BGP] Mortier, R. and I. Pratt, "Incentive Based Inter-Domain | |||
Routeing", Proc Internet Charging and QoS Technology | Routeing", Proc Internet Charging and QoS Technology | |||
Workshop (ICQT'03) pp308--317, September 2003, <http:// | Workshop (ICQT'03) pp308--317, September 2003, <http:// | |||
research.microsoft.com/users/mort/publications.aspx>. | research.microsoft.com/users/mort/publications.aspx>. | |||
[ECN-MPLS] | [I-D.arumaithurai-nsis-pcn] | |||
Davie, B., Briscoe, B., and J. Tay, "Explicit Congestion | Arumaithurai, M., "NSIS PCN-QoSM: A Quality of Service | |||
Marking in MPLS", draft-ietf-tsvwg-ecn-mpls-01 (work in | Model for Pre-Congestion Notification (PCN)", | |||
progress), June 2007. | draft-arumaithurai-nsis-pcn-00 (work in progress), | |||
September 2007. | ||||
[I-D.ietf-nsis-rmd] | ||||
Bader, A., "RMD-QOSM - The Resource Management in Diffserv | ||||
QOS Model", draft-ietf-nsis-rmd-12 (work in progress), | ||||
November 2007. | ||||
[I-D.ietf-pcn-architecture] | ||||
Eardley, P., "Pre-Congestion Notification Architecture", | ||||
draft-ietf-pcn-architecture-03 (work in progress), | ||||
February 2008. | ||||
[IXQoS] Briscoe, B. and S. Rudkin, "Commercial Models for IP | [IXQoS] Briscoe, B. and S. Rudkin, "Commercial Models for IP | |||
Quality of Service Interconnect", BT Technology Journal | Quality of Service Interconnect", BT Technology Journal | |||
(BTTJ) 23(2)171--195, April 2005, | (BTTJ) 23(2)171--195, April 2005, | |||
<http://www.cs.ucl.ac.uk/staff/B.Briscoe/pubs.html#ixqos>. | <http://www.cs.ucl.ac.uk/staff/B.Briscoe/pubs.html#ixqos>. | |||
[NSIS-RMD] | ||||
Bader, A., Westberg, L., Karagiannis, G., Kappler, C., and | ||||
T. Phelan, "RMD-QOSM - The Resource Management in Diffserv | ||||
QOS Model", draft-ietf-nsis-rmd-09 (work in progress), | ||||
March 2007. | ||||
[PCN-arch] | ||||
Eardley, P., Babiarz, J., Chan, K., Charny, A., Geib, R., | ||||
Karagiannis, G., Menth, M., and T. Tsou, "Pre-Congestion | ||||
Notification Architecture", | ||||
draft-eardley-pcn-architecture-00 (work in progress), | ||||
June 2007. | ||||
[RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S. | [RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S. | |||
Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 | Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 | |||
Functional Specification", RFC 2205, September 1997. | Functional Specification", RFC 2205, September 1997. | |||
[RFC2207] Berger, L. and T. O'Malley, "RSVP Extensions for IPSEC | [RFC2207] Berger, L. and T. O'Malley, "RSVP Extensions for IPSEC | |||
Data Flows", RFC 2207, September 1997. | Data Flows", RFC 2207, September 1997. | |||
[RFC2208] Mankin, A., Baker, F., Braden, B., Bradner, S., O'Dell, | [RFC2208] Mankin, A., Baker, F., Braden, B., Bradner, S., O'Dell, | |||
M., Romanow, A., Weinrib, A., and L. Zhang, "Resource | M., Romanow, A., Weinrib, A., and L. Zhang, "Resource | |||
ReSerVation Protocol (RSVP) Version 1 Applicability | ReSerVation Protocol (RSVP) Version 1 Applicability | |||
skipping to change at page 50, line 8 | skipping to change at page 50, line 5 | |||
Felstaine, "A Framework for Integrated Services Operation | Felstaine, "A Framework for Integrated Services Operation | |||
over Diffserv Networks", RFC 2998, November 2000. | over Diffserv Networks", RFC 2998, November 2000. | |||
[RFC3540] Spring, N., Wetherall, D., and D. Ely, "Robust Explicit | [RFC3540] Spring, N., Wetherall, D., and D. Ely, "Robust Explicit | |||
Congestion Notification (ECN) Signaling with Nonces", | Congestion Notification (ECN) Signaling with Nonces", | |||
RFC 3540, June 2003. | RFC 3540, June 2003. | |||
[RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4, | [RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6, ICMPv4, | |||
ICMPv6, UDP, and TCP Headers", RFC 4727, November 2006. | ICMPv6, UDP, and TCP Headers", RFC 4727, November 2006. | |||
[RFC5129] Davie, B., Briscoe, B., and J. Tay, "Explicit Congestion | ||||
Marking in MPLS", RFC 5129, January 2008. | ||||
[Re-fb] Briscoe, B., Jacquet, A., Di Cairano-Gilfedder, C., | [Re-fb] Briscoe, B., Jacquet, A., Di Cairano-Gilfedder, C., | |||
Salvatori, A., Soppera, A., and M. Koyabe, "Policing | Salvatori, A., Soppera, A., and M. Koyabe, "Policing | |||
Congestion Response in an Internetwork Using Re-Feedback", | Congestion Response in an Internetwork Using Re-Feedback", | |||
ACM SIGCOMM CCR 35(4)277--288, August 2005, <http:// | ACM SIGCOMM CCR 35(4)277--288, August 2005, <http:// | |||
www.acm.org/sigs/sigcomm/sigcomm2005/ | www.acm.org/sigs/sigcomm/sigcomm2005/ | |||
techprog.html#session8>. | techprog.html#session8>. | |||
[Smart_rtg] | [Smart_rtg] | |||
Goldenberg, D., Qiu, L., Xie, H., Yang, Y., and Y. Zhang, | Goldenberg, D., Qiu, L., Xie, H., Yang, Y., and Y. Zhang, | |||
"Optimizing Cost and Performance for Multihoming", ACM | "Optimizing Cost and Performance for Multihoming", ACM | |||
skipping to change at page 54, line 7 | skipping to change at page 54, line 7 | |||
Martlesham Heath | Martlesham Heath | |||
Ipswich IP5 3RE | Ipswich IP5 3RE | |||
UK | UK | |||
Phone: +44 1473 645196 | Phone: +44 1473 645196 | |||
Email: bob.briscoe@bt.com | Email: bob.briscoe@bt.com | |||
URI: http://www.cs.ucl.ac.uk/staff/B.Briscoe/ | URI: http://www.cs.ucl.ac.uk/staff/B.Briscoe/ | |||
Full Copyright Statement | Full Copyright Statement | |||
Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2008). | |||
This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
retain all their rights. | retain all their rights. | |||
This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | |||
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | |||
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | |||
End of changes. 26 change blocks. | ||||
132 lines changed or deleted | 144 lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |