TOC 
Congestion and Pre-CongestionPhilip. Eardley (Editor)
Notification Working GroupBT
Internet-DraftNovember 19, 2007
Intended status: Informational 
Expires: May 22, 2008 


Pre-Congestion Notification Architecture
draft-ietf-pcn-architecture-02

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on May 22, 2008.

Copyright Notice

Copyright © The IETF Trust (2007).

Abstract

The purpose of this document is to describe a general architecture for flow admission and termination based on aggregated pre-congestion information in order to protect the quality of service of established inelastic flows within a single DiffServ domain.

Status



Table of Contents

1.  Introduction
2.  Terminology
3.  Assumptions and constraints on scope
    3.1.  Assumption 1: Trust - controlled environment
    3.2.  Assumption 2: Real-time applications
    3.3.  Assumption 3: Many flows and additional load
    3.4.  Assumption 4: Emergency use out of scope
    3.5.  Other assumptions
4.  High-level functional architecture
    4.1.  Flow admission
    4.2.  Flow termination
    4.3.  Flow admission and flow termination
    4.4.  Information transport
    4.5.  PCN-traffic
5.  Detailed Functional architecture
    5.1.  PCN-interior-node functions
    5.2.  PCN-ingress-node functions
    5.3.  PCN-egress-node functions
    5.4.  Admission control functions
    5.5.  Flow termination functions
    5.6.  Addressing
    5.7.  Tunnelling
    5.8.  Fault handling
6.  Design goals and challenges
7.  Probing
    7.1.  Introduction
    7.2.  Probing functions
    7.3.  Discussion of rationale for probing, its downsides and open issues
8.  Operations and Management
    8.1.  Configuration OAM
        8.1.1.  System options
        8.1.2.  Parameters
    8.2.  Performance & Provisioning OAM
    8.3.  Accounting OAM
    8.4.  Fault OAM
    8.5.  Security OAM
9.  IANA Considerations
10.  Security considerations
11.  Conclusions
12.  Acknowledgements
13.  Comments Solicited
14.  Changes
15.  Informative References
§  Author's Address
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

The purpose of this document is to describe a general architecture for flow admission and termination based on aggregated (pre-) congestion information in order to protect the quality of service of flows within a DiffServ domain [RFC2475] (Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W. Weiss, “An Architecture for Differentiated Services,” December 1998.). This document defines an architecture for implementing two mechanisms to protect the quality of service of established inelastic flows within a single DiffServ domain, where all boundary and interior nodes are PCN-enabled and trust each other for correct PCN operation. Flow admission control determines whether a new flow should be admitted and protects the QoS of existing PCN-flows in normal circumstances, by avoiding congestion occurring. However, in abnormal circumstances, for instance a disaster affecting multiple nodes and causing traffic re-routes, then the QoS on existing PCN-flows may degrade even though care was exercised when admitting those flows before those circumstances. Therefore we also propose a mechanism for flow termination, which removes enough traffic in order to protect the QoS of the remaining PCN-flows.

As a fundamental building block to enable these two mechanisms, PCN-interior-nodes generate, encode and transport pre-congestion information towards the PCN-egress-nodes. Two rates, a PCN-lower-rate and a PCN-upper-rate, can be associated with each link of the PCN-domain. Each rate is used by a marking behaviour (specified in another document) that determines how and when a number of PCN-packets are marked, and how the markings are encoded in packet headers. PCN-egress-nodes make measurements of the packet markings and send information as necessary to the nodes that make the decision about which PCN-flows to accept/reject or terminate, based on this information. Another document will describe the decision-making behaviours. Overall the aim is to enable PCN-nodes to give an "early warning" of potential congestion before there is any significant build-up of PCN-packets in the queue; the admission control mechanism limits the PCN-traffic on each link to *roughly* its PCN-lower-rate and the flow termination mechanism limits the PCN-traffic on each link to *roughly* its PCN-upper-rate.

We believe that the key benefits of the PCN mechanisms described in this document are that they are simple, scalable, and robust because:

Operators of networks will want to use the PCN mechanisms in various arrangements, for instance depending on how they are performing admission control outside the PCN-domain (users after all are concerned about QoS end-to-end), what their particular goals and assumptions are, and so on. Several deployment models are possible:



 TOC 

2.  Terminology



 TOC 

3.  Assumptions and constraints on scope

The PCN WG's charter restricts the initial scope by a set of assumptions. Here we list those assumptions and explain them.

  1. these components are deployed in a single DiffServ domain, within which all PCN-nodes are PCN-enabled and trust each other for truthful PCN-marking and transport
  2. all flows handled by these mechanisms are inelastic and constrained to a known peak rate through policing or shaping
  3. the number of PCN-flows across any potential bottleneck link is sufficiently large that stateless, statistical mechanisms can be effective. To put it another way, the aggregate bit rate of PCN-traffic across any potential bottleneck link needs to be sufficiently large relative to the maximum additional bit rate added by one flow
  4. PCN-flows may have different precedence, but the applicability of the PCN mechanisms for emergency use (911, GETS, WPS, MLPP, etc.) is out of scope

After completion of the initial phase, the PCN WG may re-charter to develop solutions for specific scenarios where some of these restrictions are not in place. It may also re-charter to consider applying the PCN mechanisms to additional deployment scenarios. One possible example is where a single PCN-domain encompasses several DiffServ domains that don't trust each other (perhaps by using a mechanism like re-ECN, [I‑D.briscoe‑re‑pcn‑border‑cheat] (, “Emulating Border Flow Policing using Re-ECN on Bulk Data,” June 2006.). The WG may also re-charter to investigate additional response mechanisms that act on (pre-)congestion information. One example could be flow-rate adaptation by elastic applications (rather than flow admission or termination). The details of these work items are outside the scope of the initial phase, but the WG may consider their requirements in order to design components that are sufficiently general to support such extensions in the future. The working assumption is that the standards developed in the initial phase should not need to be modified to satisfy the solutions for when these restrictions are removed.



 TOC 

3.1.  Assumption 1: Trust - controlled environment

We assume that the PCN-domain is a controlled environment, i.e. all the nodes in a PCN-domain run PCN and trust each other. There are several reasons for proposing this assumption:

One way of assuring the above two points is that the entire PCN-domain is run by a single operator. Another possibility is that there are several operators but they trust each other to a sufficient level, in their handling of PCN-traffic.

Note: All PCN-nodes need to be trustworthy. However if it's known that an interface cannot become pre-congested then it's not strictly necessary for it to be capable of PCN-marking. But this must be known even in unusual circumstances, eg after the failure of some links.



 TOC 

3.2.  Assumption 2: Real-time applications

We assume that any variation of source bit rate is independent of the level of pre-congestion. We assume that PCN-packets come from real time applications generating inelastic traffic (, “Fundamental design issues for the future Internet,” 1995.) [Shenker] like voice and video requiring low delay, jitter and packet loss, for example the Controlled Load Service, [RFC2211] (Wroclawski, J., “Specification of the Controlled-Load Network Element Service,” September 1997.), and the Telephony service class, [RFC4594] (Babiarz, J., Chan, K., and F. Baker, “Configuration Guidelines for DiffServ Service Classes,” August 2006.). This assumption is to help focus the effort where it looks like PCN would be most useful, ie the sorts of applications where per flow QoS is a known requirement. For instance, the impact of this assumption would be to guide simulations work.



 TOC 

3.3.  Assumption 3: Many flows and additional load

We assume that there are many flows on any bottleneck link in the PCN-domain (or, to put it another way, the aggregate bit rate of PCN-traffic across any potential bottleneck link is sufficiently large relative to the maximum additional bit rate added by one flow). Measurement-based admission control assumes that the present is a reasonable prediction of the future: the network conditions are measured at the time of a new flow request, however the actual network performance must be OK during the call some time later. One issue is that if there are only a few variable rate flows, then the aggregate traffic level may vary a lot, perhaps enough to cause some packets to get dropped. If there are many flows then the aggregate traffic level should be statistically smoothed. How many flows is enough depends on a number of things such as the variation in each flow's rate, the total rate of PCN-traffic, and the size of the "safety margin" between the traffic level at which we start admission-marking and at which packets are dropped or significantly delayed.

We do not make explicit assumptions on how many PCN-flows are in each ingress-egress-aggregate. Performance evaluation work may clarify whether it is necessary to make any additional assumption on aggregation at the ingress-egress-aggregate level.



 TOC 

3.4.  Assumption 4: Emergency use out of scope

PCN-flows may have different precedence, but the applicability of the PCN mechanisms for emergency use (911, GETS, WPS, MLPP, etc) is out of scope for consideration by the PCN WG.



 TOC 

3.5.  Other assumptions

As a consequence of Assumption 2 above, it is assumed that PCN-marking is being applied to traffic scheduled with the expedited forwarding per-hop behaviour, [RFC3246] (Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, J., Courtney, W., Davari, S., Firoiu, V., and D. Stiliadis, “An Expedited Forwarding PHB (Per-Hop Behavior),” March 2002.), or traffic with similar characteristics.

The following two assumptions apply if the PCN WG decides to encode PCN-marking in the ECN-field.



 TOC 

4.  High-level functional architecture

The high-level approach is to split functionality between:

The aim of this split is to keep the bulk of the network simple, scalable and robust, whilst confining policy, application-level and security interactions to the edge of the PCN-domain. For example the lack of flow awareness means that the PCN-interior-nodes don't care about the flow information associated with the PCN-packets that they carry, nor do the PCN-boundary-nodes care about which PCN-interior-nodes its flows traverse.



 TOC 

4.1.  Flow admission

At a high level, flow admission control works as follows. In order to generate information about the current state of the PCN-domain, each PCN-node PCN-marks packets if it is "pre-congested". Exactly how a PCN-node decides if it is "pre-congested" (the algorithm) and exactly how packets are "PCN-marked" (the encoding) will be defined in a separate standards-track document, but at a high level it is expected to be as follows:

NOTE: Two main categories of algorithm have been proposed: if the algorithm uses threshold-marking then all PCN-packets are marked if the current rate exceeds the PCN-lower-rate, whereas if the algorithm uses excess-rate-marking the amount marked is equal to the amount in excess of the PCN-lower-rate. However, note that this description reflects the overall intent of the algorithm rather than its instantaneous behaviour, since the rate measured at a particular moment depends on the detailed algorithm, its implementation (eg virtual queue, token bucket...) and the traffic's variance as well as its rate (eg marking may well continue after a recent overload even after the instantaneous rate has dropped).

The PCN-boundary-nodes monitor the PCN-marked packets in order to extract information about the current state of the PCN-domain. Based on this monitoring, a decision is made about whether to admit a prospective new flow. Exactly how the admission control decision is made will be defined separately (at the moment the intention is that there will be one or more informational-track RFCs), but at a high level two approaches have been proposed to date:

Note that the PCN-lower-rate is a parameter that can be configured by the operator. It will be set lower than the traffic rate at which the link becomes congested and the node drops packets. (Hence, by analogy with ECN we call our mechanism Pre-Congestion Notification.)

Note also that the admission control decision is made for a particular ingress-egress-aggregate. So it is quite possible for a new flow to be admitted between one pair of PCN-boundary-nodes, whilst at the same time another admission request is blocked between a different pair of PCN-boundary-nodes.



 TOC 

4.2.  Flow termination

At a high level, flow termination control works as follows. Each PCN-node PCN-marks packets in a similar fashion to above. An obvious approach is for the algorithm to use a second configured parameter, PCN-upper-rate, and a second header encoding. However there is also a proposal to use the same rate and the same encoding. Several approaches have been proposed to date about how to convert this information into a flow termination decision; at a high level these are as follows:

Since flow termination is designed for "abnormal" circumstances, it is quite likely that some PCN-nodes are congested and hence packets are being dropped and/or significantly queued. The flow termination mechanism must bear this in mind.

Note also that the termination control decision is made for a particular ingress-egress-aggregate. So it is quite possible for PCN-flows to be terminated between one pair of PCN-boundary-nodes, whilst at the same time none are terminated between a different pair of PCN-boundary-nodes.



 TOC 

4.3.  Flow admission and flow termination

Although designed to work together, flow admission and flow termination are independent mechanisms, and the use of one does not require or prevent the use of the other.

For example, an operator could use just admission control, solving heavy congestion (caused by re-routing) by 'just waiting' - as sessions end, existing microflows naturally depart from the system over time, and the admission control mechanism will prevent admission of new microflows that use the affected links. So the PCN-domain will naturally return to normal operation, but with reduced capacity. The drawback of this approach would be that until PCN-flows naturally depart to relieve the congestion, all PCN-flows as well as lower priority services will be adversely affected. On the other hand, an operator could just rely for admission control on statically provisioned capacity per PCN-ingress-node (regardless of the PCN-egress-node of a flow), as is typical in the hose model of the DiffServ architecture [RFC2475] (Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W. Weiss, “An Architecture for Differentiated Services,” December 1998.). Such traffic conditioning agreements can lead to focused overload: many flows happen to focus on a particular link and then all flows through the congested link fail catastrophically. The flow termination mechanism could then be used to counteract such a problem.

A different possibility is to configure only the PCN-lower-rate and hence only do one type of PCN-marking, but generate admission and flow termination responses from different levels of marking. This is suggested in [I‑D.charny‑pcn‑single‑marking] (, “Pre-Congestion Notification Using Single Marking for Admission and Termination,” November 2007.) which gives some of the pros and cons of this approach.



 TOC 

4.4.  Information transport

The transport of pre-congestion information from a PCN-node to a PCN-egress-node is through PCN-markings in data packet headers, no signalling protocol messaging is needed. However, signalling is needed to transport PCN-feedback-information between the PCN-boundary-nodes, for example to convey the fraction of PCN-marked traffic from a PCN-egress-node to the relevant PCN-ingress-node. Exactly what information needs to be transported will be described in the future PCN WG document(s) about the boundary mechanisms. The signalling could be done by an extension of RSVP or NSIS, for instance; protocol work will be done by the relevant WG, but for example [I‑D.lefaucheur‑rsvp‑ecn] (Faucheur, F., “RSVP Extensions for Admission Control over Diffserv using Pre-congestion Notification (PCN),” June 2006.) describes the extensions needed for RSVP.



 TOC 

4.5.  PCN-traffic

The following are some high-level points about how PCN works:



 TOC 

5.  Detailed Functional architecture

This section is intended to provide a systematic summary of the new functional architecture in the PCN-domain. First it describes functions needed at the three specific types of PCN-node; these are data plane functions and are in addition to their normal router functions. Then it describes further functionality needed for both flow admission control and flow termination; these are signalling and decision-making functions, and there are various possibilities for where the functions are physically located. The section is split into:

  1. functions needed at PCN-interior-nodes
  2. functions needed at PCN-ingress-nodes
  3. functions needed at PCN-egress-nodes
  4. other functions needed for flow admission control
  5. other functions needed for flow termination control

Note: Probing is covered in Section 7.

The section then discusses some other detailed topics:

  1. addressing
  2. tunnelling
  3. fault handling


 TOC 

5.1.  PCN-interior-node functions

Each interface of the PCN-domain is upgraded with the following functionality:

The same general approach of metering and PCN-marking is performed for both flow admission control and flow termination, however the algorithms and encoding may be different.

These functions are needed for each interface of the PCN-domain. They are therefore needed on all interfaces of PCN-interior-nodes, and on the interfaces of PCN-boundary-nodes that are internal to the PCN-domain. There may be more than one PCN-meter and marker installed at a given interface, eg one for admission and one for termination.



 TOC 

5.2.  PCN-ingress-node functions

Each ingress interface of the PCN-domain is upgraded with the following functionality:

The first two are policing functions, needed to make sure that PCN-packets let into the PCN-domain belong to a flow that's been admitted and to ensure that the flow doesn't go at a faster rate than agreed. The filter spec will for example come from the flow request message (outside scope of PCN WG, see [I‑D.briscoe‑tsvwg‑cl‑architecture] (Briscoe, B., “An edge-to-edge Deployment Model for Pre-Congestion Notification: Admission Control over a DiffServ Region,” October 2006.) for an example using RSVP). PCN-colouring allows the rest of the PCN-domain to recognise PCN-packets.



 TOC 

5.3.  PCN-egress-node functions

Each egress interface of the PCN-domain is upgraded with the following functionality:

Another PCN WG document, about boundary mechanisms, will describe what the “measurements of PCN-traffic” are. This depends on whether the measurement is targeted at admission control or flow termination. It also depends on what encoding and PCN-marking algorithms are specified by the PCN WG.



 TOC 

5.4.  Admission control functions

Specific admission control functions can be performed at a PCN-boundary-node (PCN-ingress-node or PCN-egress-node) or at a centralised node, but not at normal PCN-interior-nodes. The functions are:

There are various possibilities for how the functionality can be distributed (we assume the operator would configure which is used):



 TOC 

5.5.  Flow termination functions

Specific termination control functions can be performed at a PCN-boundary-node (PCN-ingress-node or PCN-egress-node) or at a centralised node, but not at normal PCN-interior-nodes. There are various possibilities for how the functionality can be distributed, similar to those discussed above in the Admission control section; the flow termination decision could be made at the PCN-ingress-node, the PCN-egress-node or at some centralised node. The functions are:



 TOC 

5.6.  Addressing

PCN-nodes may need to know the address of other PCN-nodes:



 TOC 

5.7.  Tunnelling

Tunnels may originate and/or terminate within a PCN-domain. It is important that the PCN-marking of any packet can potentially influence PCN’s flow admission control and termination – it shouldn’t matter whether the packet happens to be tunnelled at the PCN-node that PCN-marks the packet, or indeed whether it’s decapsulated or encapsulated by a subsequent PCN-node. This suggests that the “uniform conceptual model” described in [RFC2983] (Black, D., “Differentiated Services and Tunnels,” October 2000.) should be re-applied in the PCN context. In line with this and the approach of [RFC4303] (Kent, S., “IP Encapsulating Security Payload (ESP),” December 2005.) and [I‑D.briscoe‑tsvwg‑ecn‑tunnel] (, “Layered Encapsulation of Congestion Notification,” June 2007.), the following rule is applied if encapsulation is done within the PCN-domain:

Similarly, in line with the “uniform conceptual model” of [RFC2983] (Black, D., “Differentiated Services and Tunnels,” October 2000.) and the “full-functionality option” of [RFC3168] (Ramakrishnan, K., Floyd, S., and D. Black, “The Addition of Explicit Congestion Notification (ECN) to IP,” September 2001.), the following rule is applied if decapsulation is done within the PCN-domain:

An operator may wish to tunnel PCN-traffic from PCN-ingress-nodes to PCN-egress-nodes. The PCN-marks shouldn’t be visible outside the PCN-domain, which can be achieved by doing the PCN-colour function (Section 5.3) after all the other (PCN and tunnelling) functions. The potential reasons for doing such tunnelling are: the PCN-egress-node then automatically knows the address of the relevant PCN-ingress-node for a flow; even if ECMP is running, all PCN-packets on a particular ingress-egress-aggregate follow the same path. But it also has drawbacks, for example the additional overhead in terms of bandwidth and processing.

Potential issues arise for a “partially PCN-capable tunnel”, ie where only one tunnel endpoint is in the PCN domain:

  1. The tunnel starts outside a PCN-domain and finishes inside it. If the packet arrives at the tunnel ingress with the same encoding as used within the PCN-domain to indicate PCN-marking, then this could lead the PCN-egress-node to falsely measure pre-congestion.
  2. The tunnel starts inside a PCN-domain and finishes outside it. If the packet arrives at the tunnel ingress already PCN-marked, then it will still have the same encoding when it’s decapsulated which could potentially confuse nodes beyond the tunnel egress.

In line with the solution for partially capable DiffServ tunnels in [2983], the following rules are applied:

Note that the above implies that one has to know, or figure out, the characteristics of the other end of the tunnel as part of setting it up.



 TOC 

5.8.  Fault handling

If a PCN-interior-node fails (or one of its links), then lower layer protection mechanisms or the regular IP routing protocol will eventually re-route round it. If the new route can carry all the admitted traffic, flows will gracefully continue. If instead this causes early warning of pre-congestion on the new route, then admission control based on pre-congestion notification will ensure new flows will not be admitted until enough existing flows have departed. Re-routing may result in heavy (pre-)congestion, when the flow termination mechanism will kick in.

If a PCN-boundary-node fails then we would like the regular QoS signalling protocol to take care of things. As an example [I‑D.briscoe‑tsvwg‑cl‑architecture] (Briscoe, B., “An edge-to-edge Deployment Model for Pre-Congestion Notification: Admission Control over a DiffServ Region,” October 2006.) considers what happens if RSVP is the QoS signalling protocol. The details for a specific signalling protocol are out of scope of the PCN WG, however there is a WG Milestone on generic "Requirements for signalling".



 TOC 

6.  Design goals and challenges

Prior work on PCN and similar mechanisms has thrown up a number of considerations about PCN's design goals (things PCN should be good at) and some issues that have been hard to solve in a fully satisfactory manner. Taken as a whole it represents a list of trade-offs (it's unlikely that they can all be 100% achieved) and perhaps as evaluation criteria to help an operator (or the IETF) decide between options.

The following are key design goals for PCN (based on [I‑D.chan‑pcn‑problem‑statement] (Chan, K., “Pre-Congestion Notification Problem Statement,” October 2006.)):

The following are open issues. They are mainly taken from [I‑D.briscoe‑tsvwg‑cl‑architecture] (Briscoe, B., “An edge-to-edge Deployment Model for Pre-Congestion Notification: Admission Control over a DiffServ Region,” October 2006.) which also describes some possible solutions. Note that some may be considered unimportant in general or in specific deployment scenarios or by some operators.

NOTE: Potential solutions are out of scope for this document.



 TOC 

7.  Probing



 TOC 

7.1.  Introduction

Probing is an optional mechanism to assist admission control.

PCN’s admission control, as described so far, is essentially a reactive mechanism where the PCN-egress-node monitors the pre-congestion level for traffic from each PCN-ingress-node; if the level rises then it blocks new flows on that ingress-egress-aggregate. However, it’s possible that an ingress-egress-aggregate carries no traffic, and so the PCN-egress-node can’t make an admission decision using the usual method described earlier.

One approach is to be “optimistic” and simply admit the new flow. However it’s possible to envisage a scenario where the traffic levels on other ingress-egress-aggregates are already so high that they’re blocking new PCN-flows, and admitting a new flow onto this 'empty' ingress-egress-aggregate adds extra traffic onto the link that’s already pre-congested – which may ‘tip the balance’ so that PCN’s flow termination mechanism is activated or some packets are dropped. This risk could be lessened by configuring on each link sufficient ‘safety margin’ above the PCN-lower-rate.

An alternative approach is to make PCN a more proactive mechanism. The PCN-ingress-node explicitly determines, before admitting the prospective new flow, whether the ingress-egress-aggregate can support it. This can be seen as a “pessimistic” approach, in contrast to the “optimism” of the approach above. It involves probing: a PCN-ingress-node generates and sends probe packets in order to test the pre-congestion level that the flow would experience.

One possibility is that a probe packet is just a dummy data packet, generated by the PCN-ingress-node and addressed to the PCN-egress-node. Another possibility is that a probe packet is a signalling packet that is anyway travelling from the PCN-ingress-node to the PCN-egress-node (eg an RSVP PATH message travelling from source to destination).



 TOC 

7.2.  Probing functions

The probing functions are:



 TOC 

7.3.  Discussion of rationale for probing, its downsides and open issues

It is an unresolved question whether probing is really needed, but three viewpoints have been put forward as to why it is useful. The first is perhaps the most obvious: there is no PCN-traffic on the ingress-egress-aggregate. The second assumes that multipath routing ECMP is running in the PCN-domain. The third viewpoint is that admission control is always done by probing. We now consider each in turn.

The first viewpoint assumes the following:

On the former bullet, [PCN‑email‑traffic‑empty‑aggregates] (, “Email to PCN WG mailing list,” October 2007.) suggests that, during the future busy hour of a national network with about 100 PCN-boundary-nodes, there are likely to be significant numbers of aggregates with very few flows under nearly all circumstances.

The latter bullet could occur if a new flow starts on many of the empty ingress-egress-aggregates and causes overload on a link in the PCN-domain. To be a problem this would probably have to happen in a short time period (flash crowd) because, after the reaction time of the system, other (non-empty) ingress-egress-aggregates that pass through the link will measure pre-congestion and so block new flows, and also flows naturally end anyway.

The downsides of probing for this viewpoint are:

The open issues associated with this viewpoint include:

The second viewpoint applies in the case where there is multipath routing (ECMP) in the PCN-domain. Note that ECMP is often used on core networks. There are two possibilities:

(1) If admission control is based on measurements of the ingress-egress-aggregate, then the viewpoint that probing is useful assumes:

(2) If admission control is based on measurements of pre-congestion on specific ECMP paths, then the viewpoint that probing is useful assumes:

The downsides of probing for this viewpoint are:

The third viewpoint assumes the following:

The first point breaks Assumption 3 (aggregation) and hence means that this viewpoint is out of scope of the initial Charter of the PCN WG.



 TOC 

8.  Operations and Management

This Section considers operations and management issues, under the FCAPS headings: OAM of Faults, Configuration, Accounting, Performance and Security. Provisioning is discussed with performance.



 TOC 

8.1.  Configuration OAM

This architecture document predates the detailed standards actions of the PCN WG. Here we assume that only interoperable PCN-marking behaviours will be standardised, otherwise we would have to consider how to avoid interactions between non-interoperable marking behaviours. However, more diversity in edge-node behaviours is expected, in order to interface with diverse industry architectures.

PCN configuration control variables fall into the following categories:

All configurable variables will need to sit within an SNMP management framework [RFC3411] (Harrington, D., Presuhn, R., and B. Wijnen, “An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks,” December 2002.), being structured within a defined management information base (MIB) on each node, and being remotely readable and settable via a suitably secure management protocol (SNMPv3).

Some configuration options and parameters have to be set once to 'globally' control the whole PCN-domain. Where possible, these are identified below. This may affect operational complexity and the chances of interoperability problems between kit from different vendors.



 TOC 

8.1.1.  System options

On PCN-interior-nodes there will be very few system options:

PCN-boundary-nodes (ingress and egress) will have more system options:

PCN-egress-nodes will have further system options:



 TOC 

8.1.2.  Parameters

Like any DiffServ domain, every node within a PCN-domain will need to be configured with the DSCP(s) used to identify PCN-packets. On each interior link the main configuration parameters are the PCN-lower-rate and PCN-upper-rate. A larger PCN-lower-rate enables more PCN-traffic to be admitted on a link, hence improving capacity utilisation. A PCN-upper-rate set further above the PCN-lower-rate allows greater increases in traffic (whether due to natural fluctuations or some unexpected event) before any flows are terminated, ie minimises the chances of unnecessarily triggering the termination mechanism. For instance an operator may want to design their network so that it can cope with a failure of any single PCN-node without terminating any flows.

Setting these rates on first deployment of PCN will be very similar to the traditional process for sizing an admission controlled network, depending on: the operator's requirements for minimising flow blocking (grade of service), the expected PCN traffic load on each link and its statistical characteristics (the traffic matrix), contingency for re-routing the PCN traffic matrix in the event of single or multiple failures and the expected load from other classes relative to link capacities. But once a domain is up and running, a PCN design goal is to be able to determine growth in these configured rates much more simply, by monitoring PCN-marking rates from actual rather than expected traffic (see Section 8.2 on Performance & Provisioning).

Operators may also wish to configure a rate greater than the PCN-upper-rate that is the absolute maximum rate that a link allows for PCN-traffic. This may simply be the physical link rate, but some operators may wish to configure a logical limit to prevent starvation of other traffic classes during any brief period after PCN-traffic exceeds the PCN-upper-rate but before flow termination brings it back below this rate.

Specific marking algorithms will also depend on further configuration parameters. For instance, threshold-marking will require a threshold queue depth and excess-rate-marking may require a scaling parameter. It will be preferable for each marking algorithm to have rules to set defaults for these parameters relative to the reference marking rate, but then allow operators to change them, for instance if average traffic characteristics change over time. The PCN-egress-node may allow configuration of the following:

Whichever node makes admission and flow termination decisions will contain algorithms for converting PCN-marking levels into admission or flow termination decisions. These will also require configurable parameters, for instance:

One particular proposal, [I‑D.charny‑pcn‑single‑marking] (, “Pre-Congestion Notification Using Single Marking for Admission and Termination,” November 2007.) would require a global parameter to be defined on all PCN-nodes, but only needs the PCN-lower-rate to be configured on each link. The global parameter is a scaling factor between admission and termination, for example the amount by which the PCN-upper-rate is implicitly assumed to be above the PCN-lower-rate. [I‑D.charny‑pcn‑single‑marking] (, “Pre-Congestion Notification Using Single Marking for Admission and Termination,” November 2007.) discusses in full the impact of this particular proposal on the operation of PCN.



 TOC 

8.2.  Performance & Provisioning OAM

Monitoring of performance factors measurable from *outside* the PCN domain will be no different with PCN than with any other packet-based flow admission control system, both at the flow level (blocking probability etc) and the packet level (jitter [RFC3393] (Demichelis, C. and P. Chimento, “IP Packet Delay Variation Metric for IP Performance Metrics (IPPM),” November 2002.), [Y.1541] (, “Network Performance Objectives for IP-based Services,” February 2006.), loss rate [RFC4656] (Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. Zekauskas, “A One-way Active Measurement Protocol (OWAMP),” September 2006.), mean opinion score [P.800] (, “Methods for subjective determination of transmission quality,” August 1996.), etc). The difference is that PCN is intentionally designed to indicate *internally* which exact resource(s) are the cause of performance problems and by how much.

Even better, PCN indicates which resources will probably cause problems if they are not upgraded soon. This can be achieved by the management system monitoring the total amount (in bytes) of PCN-marking generated by each queue over a period. Given possible long provisioning lead times, pre-congestion volume is the best metric to reveal whether sufficient persistent demand has mounted up to warrant an upgrade. Because, even before utilisation becomes problematic, the statistical variability of traffic will cause occasional bursts of pre-congestion. This 'early warning system' decouples the process of adding customers from the provisioning process. This should cut the time to add a customer when compared against admission control provided over native DiffServ [RFC2998] (Bernet, Y., Ford, P., Yavatkar, R., Baker, F., Zhang, L., Speer, M., Braden, R., Davie, B., Wroclawski, J., and E. Felstaine, “A Framework for Integrated Services Operation over Diffserv Networks,” November 2000.), because it saves having to re-run the capacity planning process before adding each customer.

Alternatively, before triggering an upgrade, the long term pre-congestion volume on each link can be used to balance traffic load across the PCN-domain by adjusting the link weights of the routing system. When an upgrade to a link’s configured PCN-rates is required, it may also be necessary to upgrade the physical capacity available to other classes. But usually there will be sufficient physical capacity for the upgrade to go ahead as a simple configuration change. Alternatively, [Songhurst] (, “Guaranteed QoS Synthesis for Admission Control with Shared Capacity,” Feburary 2006.) has proposed an adaptive rather than preconfigured system, where the configured PCN-lower-rate is replaced with a high and low water mark and the marking algorithm automatically optimises how physical capacity is shared using the relative loads from PCN and other traffic classes.

All the above processes require just three extra counters associated with each PCN queue: PCN-markings associated with the PCN-lower-rate and PCN-upper-rate, and drop. Every time a PCN packet is marked or dropped its size in bytes should be added to the appropriate counter. Then the management system can read the counters at any time and subtract a previous reading to establish the incremental volume of each type of (pre-)congestion. Readings should be taken frequently, so that anomalous events (eg re-routes) can be separated from regular fluctuating demand if required.



 TOC 

8.3.  Accounting OAM

Accounting is only done at trust boundaries so it is out of scope of the initial Charter of the PCN WG which is confined to intra-domain issues. Use of PCN internal to a domain makes no difference to the flow signalling events crossing trust boundaries outside the PCN-domain, which are typically used for accounting.



 TOC 

8.4.  Fault OAM

Fault OAM is about preventing faults, telling the management system (or manual operator) that the system has recovered (or not) from a failure, and about maintaining information to aid fault diagnosis.

Admission blocking and particularly flow termination mechanisms should rarely be needed in practice. It would be unfortunate if they didn't work after an option had been accidentally disabled. Therefore it will be necessary to regularly test that the live system works as intended (devising a meaningful test is left as an exercise for the operator).

Section 5.9 describes how the PCN architecture has been designed to ensure admitted flows continue gracefully after recovering automatically from link or node failures. The need to record and monitor re-routing events affecting signalling is unchanged by the addition of PCN to a DiffServ domain. Similarly, re-routing events within the PCN-domain will be recorded and monitored just as they would be without PCN.

PCN-marking does make it possible to record 'near-misses'. For instance, at the PCN-egress-node a 'reporting threshold' could be set to monitor how often the system comes close to triggering flow blocking without actually doing so. Similarly, bursts of flow termination marking could be recorded even if they are not sufficiently sustained to trigger flow termination. Such statistics could be correlated with per-queue counts of marking volume (Section 8.2) to upgrade resources in danger of causing service degradation, or to trigger manual tracing of intermittent incipient errors that would otherwise have gone unnoticed.

Finally, of course, many faults are caused by failings in the management process ('human error'): a wrongly configured address in a node, a wrong address given in a signalling protocol, a wrongly configured parameter in a queueing algorithm, a node set into a different mode from other nodes, and so on. Generally, a clean design with few configurable options ensures this class of faults can be traced more easily and prevented more often. Sound management practice at run-time also helps. For instance: a management system should be used that constrains configuration changes within system rules (eg preventing an option setting inconsistent with other nodes); configuration options should also be recorded in an offline database; and regular automatic consistency checks between live systems and the database. PCN adds nothing specific to this class of problems. By the time standards are in place, we expect that the PCN WG will have ruthlessly removed gratuitous configuration choices. However, at the time of writing, the WG is yet to choose between multiple competing proposals, so the range of possible options in Section 8.1 does seem rather wide compared to the original near-zero configuration intent of the architecture.



 TOC 

8.5.  Security OAM

Security OAM is about using secure operational practices as well as being able to track security breaches or near-misses at run-time. PCN adds few specifics to the general good practice required in this field [RFC4778] (Kaeo, M., “Operational Security Current Practices in Internet Service Provider Environments,” January 2007.), other than those below. The correct functions of the system should be monitored (Section 8.2) in multiple independent ways and correlated to detect possible security breaches. Persistent (pre-)congestion marking should raise an alarm (both on the node doing the marking and on the PCN-egress-node metering it). Similarly, persistently poor external QoS metrics such as jitter or MOS should raise an alarm. The following are examples of symptoms that may be the result of innocent faults, rather than attacks, but until diagnosed they should be logged and trigger a security alarm:



 TOC 

9.  IANA Considerations

This memo includes no request to IANA.



 TOC 

10.  Security considerations

Security considerations essentially come from the Trust Assumption (Section 3.1), ie that all PCN-nodes are PCN-enabled and trust each other for truthful PCN-marking and transport. PCN splits functionality between PCN-interior-nodes and PCN-boundary-nodes, and the security considerations are somewhat different for each, mainly because PCN-boundary-nodes are flow-aware and PCN-interior-nodes are not.

Operational security advice is given in Section 8.5.



 TOC 

11.  Conclusions

The document describes a general architecture for flow admission and termination based on aggregated pre-congestion information in order to protect the quality of service of established inelastic flows within a single DiffServ domain. The main topic is the functional architecture (first covered at a high level and then at a greater level of detail). It also mentions other topics like the assumptions and open issues.



 TOC 

12.  Acknowledgements

This document is a revised version of [I‑D.eardley‑pcn‑architecture] (, “Pre-Congestion Notification Architecture,” June 2007.). Its authors were: P. Eardley, J. Babiarz, K. Chan, A. Charny, R. Geib, G. Karagiannis, M. Menth, T. Tsou. They are therefore contributors to this document.

Thanks to those who've made comments on [I‑D.eardley‑pcn‑architecture] (, “Pre-Congestion Notification Architecture,” June 2007.) and on earlier versions of this draft: Lachlan Andrew, Joe Babiarz, Fred Baker, David Black, Steven Blake, Bob Briscoe, Ken Carlberg, Anna Charny, Joachim Charzinski, Andras Csaszar, Lars Eggert, Ruediger Geib, Robert Hancock, Georgios Karagiannis, Michael Menth, Tom Taylor, Tina Tsou, Delei Yu. Thanks to Bob Briscoe who extensively revised the Operations and Management section.

This document is the result of discussions in the PCN WG and forerunner activity in the TSVWG. A number of previous drafts were presented to TSVWG: [I‑D.chan‑pcn‑problem‑statement] (Chan, K., “Pre-Congestion Notification Problem Statement,” October 2006.), (Briscoe, B., “An edge-to-edge Deployment Model for Pre-Congestion Notification: Admission Control over a DiffServ Region,” October 2006.) [I‑D.briscoe‑tsvwg‑cl‑architecture], (Briscoe, B., “Pre-Congestion Notification marking,” October 2006.) [I‑D.briscoe‑tsvwg‑cl‑phb], (, “Pre-Congestion Notification Using Single Marking for Admission and Termination,” November 2007.) [I‑D.charny‑pcn‑single‑marking], [I‑D.babiarz‑pcn‑sip‑cap] (Babiarz, J., “SIP Controlled Admission and Preemption,” October 2006.), [I‑D.lefaucheur‑rsvp‑ecn] (Faucheur, F., “RSVP Extensions for Admission Control over Diffserv using Pre-congestion Notification (PCN),” June 2006.), [I‑D.westberg‑pcn‑load‑control] (, “LC-PCN: The Load Control PCN Solution,” November 2007.). The authors of them were: B, Briscoe, P. Eardley, D. Songhurst, F. Le Faucheur, A. Charny, J. Babiarz, K. Chan, S. Dudley, G. Karagiannis, A. Bader, L. Westberg, J. Zhang, V. Liatsos, X-G. Liu, A. Bhargava.



 TOC 

13.  Comments Solicited

Comments and questions are encouraged and very welcome. They can be addressed to the IETF PCN working group mailing list <pcn@ietf.org>.



 TOC 

14.  Changes

Changes from -01 to -02:

Changes from -00 to -01:

In addition to clarifications and nit squashing, the main changes are:



 TOC 

15. Informative References

[I-D.briscoe-tsvwg-cl-architecture] Briscoe, B., “An edge-to-edge Deployment Model for Pre-Congestion Notification: Admission Control over a DiffServ Region,” draft-briscoe-tsvwg-cl-architecture-04 (work in progress), October 2006.
[I-D.briscoe-tsvwg-cl-phb] Briscoe, B., “Pre-Congestion Notification marking,” draft-briscoe-tsvwg-cl-phb-03 (work in progress), October 2006.
[I-D.babiarz-pcn-sip-cap] Babiarz, J., “SIP Controlled Admission and Preemption,” draft-babiarz-pcn-sip-cap-00 (work in progress), October 2006.
[I-D.lefaucheur-rsvp-ecn] Faucheur, F., “RSVP Extensions for Admission Control over Diffserv using Pre-congestion Notification (PCN),” draft-lefaucheur-rsvp-ecn-01 (work in progress), June 2006.
[I-D.chan-pcn-problem-statement] Chan, K., “Pre-Congestion Notification Problem Statement,” draft-chan-pcn-problem-statement-01 (work in progress), October 2006.
[I-D.ietf-pwe3-congestion-frmwk] Bryant, S., “Pseudowire Congestion Control Framework,” draft-ietf-pwe3-congestion-frmwk-00 (work in progress), February 2007.
[I-D.ietf-tsvwg-admitted-realtime-dscp] DSCPs for Capacity-Admitted Traffic,” November 2006.
[I-D.briscoe-tsvwg-ecn-tunnel] Layered Encapsulation of Congestion Notification,” June 2007.
[I-D.ietf-tsvwg-ecn-mpls] Explicit Congestion Marking in MPLS,” October 2007.
[I-D.charny-pcn-single-marking] Pre-Congestion Notification Using Single Marking for Admission and Termination,” November 2007.
[I-D.eardley-pcn-architecture] Pre-Congestion Notification Architecture,” June 2007.
[I-D.westberg-pcn-load-control] LC-PCN: The Load Control PCN Solution,” November 2007.
[I-D.behringer-tsvwg-rsvp-security-groupkeying] A Framework for RSVP Security Using Dynamic Group Keying,” June 2007.
[I-D.briscoe-re-pcn-border-cheat] Emulating Border Flow Policing using Re-ECN on Bulk Data,” June 2006.
[RFC4303] Kent, S., “IP Encapsulating Security Payload (ESP),” RFC 4303, December 2005.
[RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W. Weiss, “An Architecture for Differentiated Services,” RFC 2475, December 1998 (TXT, HTML, XML).
[RFC3246] Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, J., Courtney, W., Davari, S., Firoiu, V., and D. Stiliadis, “An Expedited Forwarding PHB (Per-Hop Behavior),” RFC 3246, March 2002.
[RFC4594] Babiarz, J., Chan, K., and F. Baker, “Configuration Guidelines for DiffServ Service Classes,” RFC 4594, August 2006.
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, “The Addition of Explicit Congestion Notification (ECN) to IP,” RFC 3168, September 2001.
[RFC2211] Wroclawski, J., “Specification of the Controlled-Load Network Element Service,” RFC 2211, September 1997 (TXT, HTML, XML).
[RFC2998] Bernet, Y., Ford, P., Yavatkar, R., Baker, F., Zhang, L., Speer, M., Braden, R., Davie, B., Wroclawski, J., and E. Felstaine, “A Framework for Integrated Services Operation over Diffserv Networks,” RFC 2998, November 2000.
[RFC3270] Le Faucheur, F., Wu, L., Davie, B., Davari, S., Vaananen, P., Krishnan, R., Cheval, P., and J. Heinanen, “Multi-Protocol Label Switching (MPLS) Support of Differentiated Services,” RFC 3270, May 2002.
[RFC1633] Braden, B., Clark, D., and S. Shenker, “Integrated Services in the Internet Architecture: an Overview,” RFC 1633, June 1994 (TXT, PS, PDF).
[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC2983] Black, D., “Differentiated Services and Tunnels,” RFC 2983, October 2000.
[RFC2747] Baker, F., Lindell, B., and M. Talwar, “RSVP Cryptographic Authentication,” RFC 2747, January 2000.
[RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, “An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks,” STD 62, RFC 3411, December 2002.
[RFC3393] Demichelis, C. and P. Chimento, “IP Packet Delay Variation Metric for IP Performance Metrics (IPPM),” RFC 3393, November 2002.
[RFC4656] Shalunov, S., Teitelbaum, B., Karp, A., Boote, J., and M. Zekauskas, “A One-way Active Measurement Protocol (OWAMP),” RFC 4656, September 2006.
[RFC4778] Kaeo, M., “Operational Security Current Practices in Internet Service Provider Environments,” RFC 4778, January 2007.
[ITU-MLPP] “Multilevel Precedence and Pre-emption Service (MLPP),” ITU-T Recommendation I.255.3, 1990.
[Iyer] An approach to alleviate link overload as observed on an IP backbone,” IEEE INFOCOM , 2003.
[Shenker] “Fundamental design issues for the future Internet,” IEEE Journal on selected areas in communications pp 1176 - 1188, Vol 13 (7), 1995.
[Y.1541] “Network Performance Objectives for IP-based Services,” ITU-T Recommendation Y.1541, February 2006.
[P.800] “Methods for subjective determination of transmission quality,” ITU-T Recommendation P.800, August 1996.
[Songhurst] Guaranteed QoS Synthesis for Admission Control with Shared Capacity,” BT Technical Report TR-CXR9-2006-001, Feburary 2006.
[PCN-email-ECMP] Email to PCN WG mailing list,” November 2007.
[PCN-email-traffic-empty-aggregates] Email to PCN WG mailing list,” October 2007.


 TOC 

Author's Address

  Philip Eardley
  BT
  B54/77, Sirius House Adastral Park Martlesham Heath
  Ipswich, Suffolk IP5 3RE
  United Kingdom
Email:  philip.eardley@bt.com


 TOC 

Full Copyright Statement

Intellectual Property

Acknowledgment