Non F. Baker Internet-Draft Cisco Systems Expires: August 13, 2004 J. Babiarz K. Chan Nortel Networks February 13, 2004 Configuration Guidelines for DiffServ Service Classes draft-baker-diffserv-basic-classes-02 Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 13, 2004. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. Abstract This paper summarizes the recommended correlation between service classes and their usage, with references to their corresponding recommended Differentiated Service Code Points (DSCP), traffic conditioners, Per-Hop Behaviors (PHB) and Active Queue Management (AQM) mechanisms. There is no intrinsic requirement that particular DSCPs, traffic conditioner PHBs and AQM be used for a certain service class, but as a policy it is useful that they be applied consistently across the network. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", Baker, et al. Expires August 13, 2004 [Page 1] Internet-Draft Document February 2004 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [4]. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 3 1.1 Expected use in the Network . . . . . . . . . . . . . . . 3 1.2 Key Differentiated Services Concepts . . . . . . . . . . . 4 1.2.1 Queuing . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.1.1 Priority Queuing . . . . . . . . . . . . . . . . . . . . . 4 1.2.1.2 Rate Queuing . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.2 Active Queue Management . . . . . . . . . . . . . . . . . 5 1.2.3 Traffic Conditioning . . . . . . . . . . . . . . . . . . . 5 1.2.4 Differentiated Services Code Point (DSCP) . . . . . . . . 6 1.2.5 Per-Hop Behavior (PHB) . . . . . . . . . . . . . . . . . . 6 1.3 Key Service Concepts . . . . . . . . . . . . . . . . . . . 6 1.3.1 Default Forwarding (DF) . . . . . . . . . . . . . . . . . 7 1.3.2 Assured Forwarding (AF) . . . . . . . . . . . . . . . . . 8 1.3.3 Expedited Forwarding (EF) . . . . . . . . . . . . . . . . 8 1.3.4 Class Selector (CS) . . . . . . . . . . . . . . . . . . . 9 1.3.5 Admission Control . . . . . . . . . . . . . . . . . . . . 9 1.3.6 Service Differentiation . . . . . . . . . . . . . . . . . 10 2. Traffic Categories and Service Classes . . . . . . . . . . 10 2.1 Deployment Scenarios . . . . . . . . . . . . . . . . . . . 14 2.2 Service Classes and Behavior Aggregates . . . . . . . . . 16 2.3 Issues with Aggregation . . . . . . . . . . . . . . . . . 17 3. Network Control Traffic Category . . . . . . . . . . . . . 18 3.1 Administrative Service Class . . . . . . . . . . . . . . . 18 3.2 Network Control Service Class . . . . . . . . . . . . . . 19 4. User Traffic Categories . . . . . . . . . . . . . . . . . 21 4.1 Interactive Traffic Category . . . . . . . . . . . . . . . 22 4.1.1 Telephony Service Class . . . . . . . . . . . . . . . . . 22 4.1.2 Multimedia Conferencing Service Class . . . . . . . . . . 24 4.2 Responsive Traffic Category . . . . . . . . . . . . . . . 26 4.2.1 Multimedia Streaming Service Class . . . . . . . . . . . . 26 4.2.2 Low Latency Data Service Class . . . . . . . . . . . . . . 29 4.3 Timely Traffic Category . . . . . . . . . . . . . . . . . 31 4.3.1 High Throughput Data Service Class . . . . . . . . . . . . 31 4.3.2 Standard Service Class . . . . . . . . . . . . . . . . . . 33 4.4 Non Critical Traffic Catgegory . . . . . . . . . . . . . . 34 4.4.1 Low Priority Data . . . . . . . . . . . . . . . . . . . . 34 5. Mapping Applications to Service Classes . . . . . . . . . 35 6. Security Considerations . . . . . . . . . . . . . . . . . 36 7. Achnoledgements . . . . . . . . . . . . . . . . . . . . . 36 Normative References . . . . . . . . . . . . . . . . . . . 36 Informative References . . . . . . . . . . . . . . . . . . 38 Authors' Addresses . . . . . . . . . . . . . . . . . . . . 39 Intellectual Property and Copyright Statements . . . . . . 40 Baker, et al. Expires August 13, 2004 [Page 2] Internet-Draft Document February 2004 1. Introduction This paper summarizes the recommended correlation between service classes and their usage, with references to their corresponding recommended Differentiated Service Code Points (DSCP), traffic conditioners, Per-Hop Behaviors (PHB) and Active Queue Management (AQM) mechanisms. There is no intrinsic requirement that particular DSCPs, traffic conditioner PHBs and AQM be used for a certain service class, but as a policy it is useful that they be applied consistently across the network. Service classes are defined, based on the different traffic characteristics and required performance of the applications/ services. This approach allows us to map current and future applications/services of similar traffic characteristic and performance requirements into the same service class. With this approach, a limited set of service classes is required. For completeness, we have defined nine different service classes, two for network operation/administration and seven for user/subscriber applications/services. However, we expect that network administrators will selectively choose the service classes that are required in their network based on their needs. 1.1 Expected use in the Network In the Internet today, corporate LANs and ISP WANs are generally not heavily utilized - they are commonly 10% utilized at most. For this reason, congestion, loss, and variation in delay within corporate LANs and ISP backbones is virtually unknown. This clashes with user perceptions, for three very good reasons. o The industry moves through cycles of bandwidth boom and bandwidth bust, depending on prevailing market conditions and the periodic deployment of new bandwidth-hungry applications. o In access networks, the state is often different. This may be because throughput rates are artificially limited, or are over subscribe, or because of access network design trade-offs. o Other characteristics, such as database design on web servers (that may create contention points, e.g. in filestore), and configuration of firewalls and routers, often look externally like a bandwidth limitation. The intent of this document is to provide a consistent marking, conditioning and packet treatment strategy so that it can be configured and put into service on any link which itself is congested. Baker, et al. Expires August 13, 2004 [Page 3] Internet-Draft Document February 2004 1.2 Key Differentiated Services Concepts The reader must be familiar with the principles of the Differentiated Services Architecture RFC 2475 [9]. However, we recapitulate key concepts here to save searching. 1.2.1 Queuing A queue is a data structure that holds traffic that is awaiting transmission. The traffic may be delayed while in the queue, possibly due to lack of bandwidth, or because it is low in priority. There are a number of ways to implement a queue; in some of these, it is more natural to discuss "service classes in a queuing system" rather than "a set of queues and a scheduler". In the literature, as a result, the concepts are used somewhat interchangeably. A simple model of a queuing system, however, is a set of data structures for packet data, which we will call queues or service classes and a mechanism for selecting the next packet from among them, which we call a scheduler. 1.2.1.1 Priority Queuing A priority queuing system is a combination of a set of queues and a scheduler that empties them in priority sequence. When asked for a packet, the scheduler inspects the highest priority queue, and if there is data present returns a packet from that queue. Failing that, it inspects the next highest priority queue, and so on. A freeway onramp with a stoplight for one lane, but which allows vehicles in the high occupancy vehicle lane to pass, is an example of a priority queuing system; the high occupancy vehicle lane represents the "queue" having priority. In a priority queuing system, a packet in the highest priority queue will experience a readily calculated delay - it is proportional to the amount of data remaining to be serialized when the packet arrived plus the volume of the data already queued ahead of it in the same queue. The technical reason for using a priority queue relates exactly to this fact: it limits delay and variations in delay, and should be used for traffic which has that requirement. A priority queue or queuing system needs to support rate and burst size control mechanism(s) to provide starvation avoidance of lower priority queues. 1.2.1.2 Rate Queuing Similarly, a rate-based queuing system is a combination of a set of Baker, et al. Expires August 13, 2004 [Page 4] Internet-Draft Document February 2004 queues and a scheduler that empties each at a specified rate. An example of a rate based queuing system is a road intersection with a stoplight - the stoplight acts as a scheduler, giving each lane a certain opportunity to pass traffic through the intersection. In a rate-based queuing system, such as WFQ or WRR, the delay that a packet in any given queue will experience is dependant on the parameters and occupancy of its queue and the parameters and occupancy of the queues it is competing with. A queue whose traffic arrival rate is much less than the rate at which it lets traffic depart will tend to be empty and packets in it will experience nominal delays. A queue whose traffic arrival rate approximates or exceeds its departure rate will tend to be not empty, and packets in it will experience greater delay. Such a scheduler can impose a minimum rate, a maximum rate, or both, on any queue it touches. 1.2.2 Active Queue Management "Active queue management" or AQM is a generic name for any of a variety of procedures that use packet dropping or marking to manage the depth of a queue. The canonical example of such a procedure is Random Early Detection, in that a queue is assigned a minimum and maximum threshold, and the queuing algorithm maintains a moving average of the queue depth. While the mean queue depth exceeds the maximum threshold, all arriving traffic is dropped. While the mean queue depth exceeds the minimum threshold but not the maximum threshold, a randomly selected subset of arriving traffic is marked or dropped. This marking or dropping of traffic is intended to communicate with the sending system, causing its congestion avoidance algorithms to kick in. As a result of this behavior, it is reasonable to expect that TCP's cyclic behavior is desynchronized, and the mean queue depth (and therefore delay) should normally approximate the minimum threshold. A variation of the algorithm is applied in Assured Forwarding [12], in that the behavior aggregate consists of traffic with multiple DSCP marks, which are intermingled in a common queue. Different minima and maxima are configured for the several DSCPs separately, such that traffic that exceeds a stated rate at ingress is more likely to be dropped or marked than traffic that is within its contracted rate. 1.2.3 Traffic Conditioning Additionally, at the first router in a network that a packet crosses, arriving traffic may be measured, and dropped or marked according to a policy, or perhaps shaped on network ingress as in A Rate Adaptive Shaper for Differentiated Services [27]. This may be used to bias feedback loops, such as is done in Assured Forwarding [12], or to Baker, et al. Expires August 13, 2004 [Page 5] Internet-Draft Document February 2004 limit the amount of traffic in a system, as is done in Expedited Forwarding [22]. Such measurement procedures are collectively referred to as "traffic conditioners". Two traffic conditioners that are used in deployment of differentiated services that use Assured Forwarding are the Two Rate Three Color Marker (trTCM) [14] and the Single Rate Three Color Marker (trTCM) [13]. Two Rate Three Color Marker: The Two Rate Three Color Marker (trTCM) [14] meters an IP packet stream and marks its packets based on two rates, Peak Information Rate (PIR) and Committed Information Rate (CIR), and their associated burst sizes to be green, yellow, or red. A packet is marked red if it exceeds the PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or doesn't exceed the CIR. The trTCM is use to enforce committed rate separately from Peak Information Rate. Single Rate Three Color Marker: The Single Rate Three Color Marker (srTCM) [13] meters an IP packet stream and marks its packets green, yellow, or red. Marking is based on a Committed Information Rate (CIR) and two associated burst sizes, a Committed Burst Size (CBS) and an Excess Burst Size (EBS). A packet is marked green if it doesn't exceed the CBS, yellow if it does exceed the CBS, but not the EBS and red otherwise. The srTCM is used to enforce the committed rate and burst length. 1.2.4 Differentiated Services Code Point (DSCP) The DSCP is a number in the range 0..63, that is placed into an IP packet to mark it according to the class of traffic it belongs in. Half of these values are earmarked for standardized services, and the other half of them are available for local definition. 1.2.5 Per-Hop Behavior (PHB) In the end, the mechanisms described above are combined to form a specified set of characteristics for handling different kinds of traffic, depending on the needs of the application. This document seeks to identify useful traffic aggregates and specify what PHB should be applied to them. 1.3 Key Service Concepts While Differentiated Services is a general architecture that may be used to implement a variety of services, three fundamental services have been defined and characterized for general use. These are basic service for elastic traffic, the Assured Forwarding service, and the Baker, et al. Expires August 13, 2004 [Page 6] Internet-Draft Document February 2004 Expedited Forwarding service for real-time (inelastic) traffic. The terms "elastic" and "real-time" are defined in RFC 1633 [3] Section 3.1, as a way of understanding broad brush application requirements. This document should be reviewed to obtain a broad understanding of the issues in quality of service, just as RFC 2475 [9] should be reviewed to understand the data plane architecture used in today's Internet. The definition of "service class" is, a description of the overall treatment of (or a subset of) a customer's traffic across a particular domain, across a set of interconnected DiffServ (DS) domains, or end-to-end. Service descriptions are covered by administrative policy and services are constructed by applying traffic conditioning to create behavior aggregates that experience a known PHB at each node within the DS domain. A service class provides the specified end-to-end behaviors in the network which will support one or more applications or a set of applications that have similar traffic characteristics and performance requirements. This concept allows grouping of applications of similar traffic characteristics and performance requirements into a common forwarding discipline called a "service class" that provides consistent behavior in the administered network. (Service class definition originates from RFC 2474 [8] Section 2, definition of a service). 1.3.1 Default Forwarding (DF) The basic services applied to any class of traffic are those described in RFC 2475 [8] and RFC 2309 [7]. Best Effort service may be summarized as "I will accept your packets", with no further guarantees. Packets in transit may be lost, reordered, duplicated, or delayed at random. Generally, networks are engineered to limit this behavior, but changing traffic loads can push any network into such a state. Application traffic in the internet is expected to be "elastic" in nature. By this, we mean that the receiver will detect loss or variation in delay in the network and provide feedback such that the sender adjusts its transmission rate to approximate available capacity. For basic best effort service, a single DSCP value is provided to identify the traffic, a queue to store it, and active queue management to protect the network from it and to limit delays. The interesting thing is that by giving that queue a higher minimum rate than its measured arrival rate, we can effectively limit the deleterious effects of congestion on a given class of traffic, transferring them to another class that is perhaps better able to Baker, et al. Expires August 13, 2004 [Page 7] Internet-Draft Document February 2004 absorb the impact or is considered to be of lower value to the network administration. So, for example, if it is important to service database exchange or transaction traffic in a timely fashion, isolating the traffic into a queue and giving it a relatively high minimum rate will accomplish that. Scavenger, or less than best effort RFC 3662 [23], service can also be provided, for applications with congestion avoidance capabilities and is considered to be of lower value to the network administrator than best effort traffic. 1.3.2 Assured Forwarding (AF) The Assured Forwarding RFC 2597 [12] service is explicitly modeled on Frame Relay's DE flag or ATM's CLP capability, and is intended for networks that offer average-rate SLAs (as FR and ATM networks do). This is an enhanced Best Effort service; traffic is expected to be "elastic" in nature. The receiver will detect loss or variation in delay in the network and provide feedback such that the sender adjusts its transmission rate to approximate available capacity. For such classes, multiple DSCP values are provided (two or three, perhaps more using local values) to identify the traffic, a common queue or class to store the aggregate and active queue management to protect the network from it and to limit delays. Traffic is metered as it enters the network, and traffic is variously marked depending on the arrival rate of the aggregate. The premise is that it is normal for users to occasionally use more capacity than their contract stipulates, perhaps up to some bound. However, if traffic must be lost or marked to manage the queue, this excess traffic will be marked or lost first. 1.3.3 Expedited Forwarding (EF) Expedited Forwarding RFC 3246 [22] was originally proposed as a way to implement a virtual wire, and can be used in such a manner. It is an enhanced best effort service: traffic remains subject to loss due to line errors and reordering during routing changes. However, using queuing techniques, the probability of delay or variation in delay is minimized. For this reason, it is generally used to carry voice and for transport of data information that requires "wire like" behavior through the IP network. Voice is an inelastic "real-time" application that sends packets at the rate the codec produces them, regardless of availability of capacity. As such, this service has the potential to disrupt or congest a network if not controlled. It also has the potential for abuse. To protect the network, at minimum one must police traffic at various Baker, et al. Expires August 13, 2004 [Page 8] Internet-Draft Document February 2004 points to ensure that the design of a queue is not over-run, and then the traffic must be given a low delay queue (often using priority, although it is asserted that a rate-based queue can do this) to ensure that variation in delay is not an issue, to meet application needs. 1.3.4 Class Selector (CS) Class Selector provides support for historical codepoint definitions and PHB requirement. The Class Selector DS field provides a limited backward compatibility with legacy (pre DiffServ) practice, as described in RFC 2474 [8] Section 4. Backward compatibility is addressed in two ways. First, there are per-hop behaviors that are already in widespread use (e.g. those satisfying the IPv4 Precedence queuing requirements specified in RFC 1812), and we wish to permit their continued use in DS-compliant networks. In addition, there are some codepoints that correspond to historical use of the IP Precedence field and we reserve these codepoints to map to PHBs that meet the general requirements specified in RFC 2474 [8]Section 4.2.2.2. No attempt is made to maintain backward compatibility with the "DTR" or TOS bits of the IPv4 TOS octet, as defined in RFC 791 [1]. A DS-compliant network can be deployed with a set of one or more Class Selector compliant PHB groups. As well, network administrator may configure the network nodes to map codepoints to PHBs irrespective of bits 3-5 of the DSCP field to yield a network that is compatible with historical IP Precedence use. Thus, for example, codepoint '011000' would map to the same PHB as codepoint '011010'. 1.3.5 Admission Control Admission control including refusal when policy thresholds are crossed, can assure high quality communication by ensuring the availability of bandwidth to carry a load. Inelastic real-time flows like VoIP (telephony) or video conferencing services can benefit from use of admission control mechanism, as generally the telephony service is configured with over subscription, meaning that some user(s) may not be able to make a call during peak periods. For VoIP (telephony) service, a common approach is to use signaling protocols such as SIP, H.323, H.248, MEGACO, RSVP, etc. to negotiate admittance and use of network transport capabilities. When a user has been authorized to send voice traffic, this admission procedure has verified that data rates will be within the capacity of the network that it will use. Since RTP voice does not react to loss or marking in any substantive way, the network must police at ingress to ensure Baker, et al. Expires August 13, 2004 [Page 9] Internet-Draft Document February 2004 that the voice traffic stays within its negotiated bounds. Having thus assured a predictable input rate, the network may use a priority queue to ensure nominal delay and variation in delay. Another approach that may be used in small and bandwidth constrained networks for limited number of flows is RSVP [5]RFC 2996 [16]. However, there is concern with the scalability RFC 2206 [6]of this solution in large networks and aggregation RFC 3175 [18]of sessions is considered to be a requirement. 1.3.6 Service Differentiation There are practical limits on the level of service differentiation that should be offered in the IP networks. We believe we have defined a practical approach in delivering service differentiation by defining different service classes that networks may choose to support to provide the appropriated level of behaviors and performance needed by current and future applications and services. The defined structure for providing services allows several applications having similar traffic characteristics and performance requirements to be grouped into one service class and therefore forwarded by single queue in a router. Also we provide a method for different applications (flows) within a service class to have unique DSCP marking so that different conditioning and policing polices may be used for different flows, through the use of Class Selector (CS) codepoints or locally defined DSCP (EXP/LU) values and associating them with the standardized PHBs. This approach provides a lot of flexibility in providing the appropriate level of service differentiation for current and new yet unknown applications without introducing significant changes to routers or network configurations when new traffic type is added to the network. 2. Traffic Categories and Service Classes This document divides traffic into five categories, one for network control and four for user/subscriber traffic. The term "user" and "subscriber" are used interchangeable in this document. Network control traffic can further be divided into two service classes: "Administrative", for flows that are critical for stable operation of the network, requiring lower delay or higher probability of being serviced than normal "Network Control" flows. User/subscriber traffic is broken down into four user traffic categories, interactive, responsive, timely and non-critical as defined by ITU-T Recommendation G.1010. These four user traffic categories can further be subdivided into one or more different service classes within each traffic category to provide further behavior differentiation. End-to-end performance requirements for these traffic categories and service classes are further defined in ITU-T Baker, et al. Expires August 13, 2004 [Page 10] Internet-Draft Document February 2004 Recommendation Y.1541, Y.1540, G.1010 and new work currently underway in ITU-T. Additionally, network administrators may choose to define other service classes. The service classes define the required treatment for the traffic in order to meet user, application or network expectations. Section 3 in this document defines the service classes that MAY be used for forwarding network control traffic and Section 4 defines the service classes that MAY be used for forwarding user traffic with examples of intended application types mapped into each of their service classes. Note that the application types are only examples and are not meant to be all-inclusive or prescriptive. Also it should be noted that the service class naming or ordering does not imply any priority ordering. They are simply reference names that are used in this document with associated QoS behaviors that are optimized for the particular application types they support. Network administrators MAY choose to assign different service class names, to the service classes that they will support. Figure 1 defines the RECOMMENDED relationship between service classes and DS codepoint(s) assignment with application examples. Baker, et al. Expires August 13, 2004 [Page 11] Internet-Draft Document February 2004 ------------------------------------------------------------------ | Service | DSCP | DSCP | Application | | Class name | name | value | Examples | |===============+=========+=============+==========================| |Administrative | CS7 | 111000 | Heartbeats | |---------------+---------+-------------+--------------------------| |Network Control| CS6 | 110000 | Network routing | |---------------+---------+-------------+--------------------------| | Telephony | EF,CS5 |101010,101000| IP Telephony | |---------------+---------+-------------+--------------------------| | Multimedia |AF41,AF42|100010,100100| Video conferencing | | Conferencing | AF43 |100110 | Interactive gaming | |---------------+---------+-------------+--------------------------| | Multimedia |AF31,AF32|011010,011100|Broadcast TV, Pay per view| | Streaming |AF33, CS4|011110,100000|Video surveillance | |---------------+---------+-------------+--------------------------| | Low Latency |AF21,AF22|010010,010100|Client/server transactions| | Data |AF23, CS3|010110,011000|peer-to-peer signaling | |---------------+---------+-------------+--------------------------| |High Throughput|AF11,AF12|001010,001100|Store&forward applications| | Data |AF13, CS2|001110,010000|Non-critcal OAM&P | |---------------+---------+-------------+--------------------------| | Standard | DF,(CS0)| 000000 | Undifferentiated | | | | | applications | |---------------+---------+-------------+--------------------------| | Low Priority | CS1 | 001000 | Any flow that has no BW | | Data | | | assurance | ------------------------------------------------------------------ Figure 1: DSCP to Service Class Mapping Note: The Class Selector 2,3 and 4 codepoints are aliases of AF11, AF21 and AF31 codepoints respectively. Class Selector 5 codepoint is alias of EF codepoint. Default Forwarding and Class Selector 0 provide equivalent behavior and use the same DS codepoint. It is expected that network administrators will choose the service classes that they will support based on their need, starting off with two or three service classes for user traffic and adding others as the need arises. Figure 2 provides a summary of DiffServ QoS mechanisms that SHOULD be used for the nine different service classes that are further defined in Section 3 and 4 of this document. Based on what applications/ services that need to be differentiated, network administrators can choose the service class(es) that need to be supported in their network. Baker, et al. Expires August 13, 2004 [Page 12] Internet-Draft Document February 2004 ------------------------------------------------------------------ | Service | DSCP | Conditioning at | PHB | Queuing| AQM| | Class | | DS Edge | Used | | | |===============+======+===================+=========+========+====| |Administrative | CS7* |Police using sr+bs | RFC2474 |Priority| No | |---------------+------+-------------------+---------+--------+----| |Network Control| CS6 |Police using sr+bs | RFC2474 | Rate |Yes | |---------------+------+-------------------+---------+--------+----| | Telephony |EF,CS5|Police using sr+bs | RFC3246 |Priority| No | |---------------+------+-------------------+---------+--------+----| | | AF41 | | | | Yes| | Multimedia | AF42 | Using trTCM | RFC2597 | Rate | per| | Conferencing | AF43 | (RFC2698) | | |DSCP| |---------------+------+-------------------+---------+--------+----| | | AF31 | Police using sr+bs| | | | | |------+-------------------| | | Yes| | Multimedia | AF32 | Police sum using | | Rate | per| | Streaming | AF33 | sr+bs | RFC2597 | |DSCP| | |------+-------------------| | |----| | | CS4 |Police using sr+bs | | | No | |---------------+------+-------------------+---------+--------+----| | | AF21 | | | | Yes| | Low | AF22 | Using srTCM | | | per| | Latency | AF23 | (RFC 2697) | RFC2597 | Rate |DSCP| | Data |------+-------------------| | |----| | | CS3 |Police using sr+bs | | | No | |---------------+------+-------------------+---------+--------+----| | | AF11 | | | | Yes| | High | AF12 | Using srTCM | | | per| | Throughput | AF13 | (RFC 2697) | RFC2597 | Rate |DSCP| | Data |------+-------------------| | |----| | | CS2 |Police using sr+bs | | | No | |---------------+------+-------------------+---------+--------+----| | Standard | DF | Not applicable | RFC2474 | Rate | Yes| |---------------+------+-------------------+---------+--------+----| | Low Priority | CS1 | Not applicable | RFC3662 | Rate | Yes| | Data | | | | | | ------------------------------------------------------------------ * Note: Administrative traffic is normally contained within a single administrated domain. Figure 2: Summary of QoS Mechanisms used for each Service Class Note: Conditioning at DS edge, means that traffic conditioning is performed at the edge of the DiffServ network were untrusted user devices are connected or between two DiffServ networks. Note: "sr+bs" represents a policing mechanism that provides single Baker, et al. Expires August 13, 2004 [Page 13] Internet-Draft Document February 2004 rate with burst size control. 2.1 Deployment Scenarios It is expected that network administrators will choose the service classes that they will support based on their need, starting off with two or three service classes for user traffic and adding others as the need arises. In this section we provide three examples of a subset of service classes that could be deployed. Example 1: A network administrator determines that they need in their network to provide three different levels of network performance (quality of service) for the services that they will be offering to their customers. They need to enable their network to provide: o Reliable VoIP (telephony) service, equivalent to PSTN o A low delay assured bandwidth data service o As well, support current Internet services For this example, the network administrator's needs are addressed with the deployment of the following service classes: o Network Control service class for routing and control traffic that is needed for reliable operation of the provider's network o Standard service class for all traffic that will receive normal (undifferentiated) forwarding treatment through their network o Telephony service class for VoIP (telephony) traffic o Low Latency Data service class for the low delay assured bandwidth differentiated data service Figure 3, provides a popular industry view of the service differentiation supported in core network. Baker, et al. Expires August 13, 2004 [Page 14] Internet-Draft Document February 2004 ----------------------------------------------------------------------- | Service | DSCP | Conditioning at | PHB | | | | Class | | DS Edge | Used | Queuing| AQM | |===============+=======+===================+=========+========+========| | | CS7* | | | | CS7=No | |Network Control| CS6 |Police using sr+bs | RFC2474 | Rate |CS6=Yes | |---------------+-------+-------------------+---------+--------+--------| | Telephony |EF, CS5|Police using sr+bs | RFC3246 |Priority| No | |---------------+-------+-------------------+---------+--------+--------| | | AF21 | | | |AF21=Yes| | Low | AF22 | Using srTCM | | |AF22=Yes| | Latency | AF23 | (RFC 2697) | RFC2597 | Rate |AF23=Yes| | Data |-------+-------------------| | |--------| | | CS3 |Police using sr+bs | | | CS3=No | |---------------+-------+-------------------+---------+--------+--------| | Standard |DF(CS0)| Not applicable | RFC2474 | Rate | Yes | | | +other| | | | | ----------------------------------------------------------------------- * Note: Administrative traffic is normally contained within a single administrated domain. Figure 3: Popular Core Network Configuration Example 2: A network administrator determines that they need to support two service classes for control and administration of their network plus six levels of service differentiation for user traffic use the following service classes: o Administrative o Network Control o Standard o Telephony o Low Latency Data o High Throughput Data o Multimedia Conferencing o Multimedia Streaming Example 3: An enterprise network administrator determines that they need to provide seven levels of service differentiation for user traffic plus one for running of their network. They would configure their network to support the following service classes: o Network Control o Telephony o Multimedia Streaming Baker, et al. Expires August 13, 2004 [Page 15] Internet-Draft Document February 2004 o Multimedia Conferencing o Low Latency Data o High Throughput Data o Standard o Low Priority Data 2.2 Service Classes and Behavior Aggregates As stated earlier (Section 1.3) in this document, a service class defines the end-to-end performance and forwarding behavior required by application(s) and service(s) using them. However, network administrator that configure core network(s) that support high speed links (100 Mbps or higher) have the freedom of how they implement the different service classes including aggregating several service classes that they support into a signal Per-Hop Behavior (PHB) or Per Domain Behavior (PDB) defined in RFC 3086 [29], as long as the performance and traffic characteristic are met for all the aggregated service classes into the signal PDB. Figure 4, provides an example of how Telephony, Multimedia Conferencing and Multimedia Streaming service classes MAY be aggregated into a single PDB. ------------------------------------------------------------------ | Service | DSCP | Conditioning at | PHB | | | | Class | | DS Edge | Used | Queuing| AQM | |============+=======+==================+========+========+========| | Network | CS7* | | | | CS7=No | | Control | CS6 |Police using sr+bs| RFC2474| Rate |CS6=Yes | |------------+-------+------------------+--------+--------+--------| | Telephony |EF, CS5|Police using sr+bs| | | | |------------+-------+------------------| | | | | | AF41 | | | | | | Multimedia | AF42 | Using trTCM | | | | |Conferencing| AF43 | (RFC2698) | | | No | |------------+-------+------------------| RFC3246| |for all | | | AF31 |Police using sr+bs| |Priority| DSCP | | |-------+------------------| | | mapped | | Multimedia | AF32 | Police sum using | | |into PHB| | Streaming | AF33 | sr+bs | | | | | |-------+------------------| | | | | | CS4 |Police using sr+bs| | | | |------------+-------+------------------+--------+--------+--------| | | AF21 | | | |AF21=Yes| | Low | AF22 | Using srTCM | | |AF22=Yes| | Latency | AF23 | (RFC 2697) | RFC2597| Rate |AF23=Yes| | Data |-------+------------------| | |--------| | | CS3 |Police using sr+bs| | | CS3=No | Baker, et al. Expires August 13, 2004 [Page 16] Internet-Draft Document February 2004 |------------+-------+------------------+--------+--------+--------| | | AF1x | | | | | | Standard |DF(CS0)| Not applicable | RFC2474| Rate | Yes | | |CS2,CS1| | | | | ------------------------------------------------------------------ * Note: Administrative traffic is normally contained within a single administrated domain. Figure 4: Aggregation in Core Network A network administrator configures a Per Domain Behavior (PDB) for real-time traffic that meets or exceeds the performance requirements and traffic characteristics of the aggregated service classes. For this example the PDB MUST be implemented using the EF PHB and all the traffic from the three aggregated service classes is forwarded using the EF PHB in this domain. Therefore there is no service differentiation between the individual aggregated service classes. Further, the network administrator MUST enforce a Service Level Agreement (SLA) for each service class that is aggregated into this PDB. The SLA for each service class SHOULD support the following parameters: o DSCP marking o Supported traffic rate o Delay through network o Delay variation or jitter o Packet loss probability o Plus, possibly other parameters Traffic entering the EF PDB MUST be measured and enforced so that: o Sum of traffic in Telephony service class is less than rate "A" bps o Sum of traffic in Multimedia Conferencing service class is less than rate "B" bps o Sum of traffic in Multimedia Streaming service class is less than rate "C" bps The EF PDB MUST to be configured so that the sum of rates A, B and C is less than the forwarding bandwidth of this PDB. The experienced delay, jitter and packet loss limits will be the same for the aggregated service classes and the network configuration of the EF PDB MUST met or exceed the performance requirements of the most stringent SLA. 2.3 Issues with Aggregation When service classes are aggregation, the original individual service class behavior and performance requirements must not be violated. Baker, et al. Expires August 13, 2004 [Page 17] Internet-Draft Document February 2004 This is especially true for real-time traffic. The PHB or PDB must be engineered so that the service rate is higher in comparison to the maximum packet rate of the individual service classes being aggregated so the smaller packets will not experience jitter outside of its tolerable range when large packets are being service by the same queue. Some of the impact of aggregating service classes can be minimized by performing careful admission control on each of the individual service class to make sure the impact of traffic of one service class (i.e. Multimedia Streaming of large packets) does not violate the behavior required by another service class (i.e. Telephone using small packets). 3. Network Control Traffic Category Network control traffic is defined as packet flows that are essential for stable operation of the administered network as well for information that may be exchanged between neighboring networks across a peering point where SLAs are in place. Network control traffic is different from user application control (signaling) that may be generated by some applications or services. Network control traffic is mostly between routers and network nodes that are used for administering, controlling or managing the network segments and the services that are provided in that network segment. A network administrator MAY choose to split the network control traffic into two service classes i.e., Administrative and Network Control to provide two different forwarding treatments or just support one forwarding treatment for all network control flows. 3.1 Administrative Service Class The Administrative service class is intended to be used for control traffic that is within a single administrative network domain. If such traffic does not get through, the administered network domain may not function properly. Example of such type of traffic is heartbeats between core network switches/routers. Such heartbeats are used to determine if the next hop is reachable. If no heartbeat is received within a specified time interval, then the sending router assumes that the particular link or next hop node is unreachable on a particular interface and subsequently reroutes the traffic to a backup interface that can reach the next hop node. This reroute is typically done in a time interval much shorter than the time it would take for the routing protocol to determine that the next hop node is unreachable. The Administrative service class if support MUST be configured using the DiffServ Class Selector (CS) PHB defined in RFC 2474 [8] and MUST be configured to receive sufficient forwarding resources so that all packets are forwarded quickly. The Administrative service class Baker, et al. Expires August 13, 2004 [Page 18] Internet-Draft Document February 2004 SHOULD be configured to use a Priority Queuing system such as defined in Section 1.2.1.1 of this document. The following protocols and application SHOULD use the Administrative service class: o Network administrator's telnet sessions from secure and trusted terminals, Secure Shell (SSH) o Protocol(s) that are transmitted between nodes within the administered network for detecting link and nodal failures o Used for critical control traffic within an administrative domain The following protocols and application MUST NOT use the Administrative service class: o User Traffic o Inter-network domain (across peering points) control traffic Traffic characteristics of packet flows in the Administrative service class: o Mostly messages between routers and network servers o Typically small packet sizes, one packet at a time o Packets requiring immediate forwarding o User traffic is not allowed to use this service class RECOMMENDED DSCP marking is CS7 (Class Selector 7) RECOMMENDED Network Edge Conditioning: o Drop or remark CS7 marked packets at ingress to DiffServ network domain o Depending on policy within the administered network, CS7 marked packets MAY be dropped or remarked to CS6 at egress of DiffServ network or across peering points 3.2 Network Control Service Class The Network Control service class is used for transmitting packets between network devices (routers, servers, etc.) that require control information to be exchanged between different administrative domains (across a peering point) and for non-critical network control information exchange within one administrative domain. Traffic transmitted in this service class is very important as it keeps the network operational and MUST to be forwarded in a timely manner. The Network Control service class MUST be configured using the DiffServ Class Selector (CS) PHB defined in RFC 2474 [8]. This service class MUST be configured so that the traffic receives a minimum bandwidth guarantee, to ensure that the packets always receive timely service. The configured forwarding resources for Network Control service class SHOULD be such that the probability of Baker, et al. Expires August 13, 2004 [Page 19] Internet-Draft Document February 2004 packet drop under peak load is very low in this service class. The Network Control service class SHOULD be configured to use a Rate Queuing system such as defined in Section 1.2.1.2 of this document. The following protocols and application SHOULD use the Network Control service class: o Routing packet flows, OSPF, BGP, ISIS, RIP o Policy management flows between nodes in the network, COPS, RSVP-TE, etc. o Signaling flows between high capacity telephony call servers or soft switches. Such high capacity devices may control thousands of telephony (VoIP) calls o Network services, DNS, DHCP, BootP, high priority OAM (SNMP) like alarms, etc. o Control information exchange within and between different administrative domains across a peering point where SLAs are in place o In 3GPP wireless solutions, UMTS Signaling/control information between wireless nodes The following protocols and applications MUST NOT use the Network Control service class: o User traffic Traffic characteristics of packet flows in the Network Control service class: o Mostly messages between routers and network servers o Ranging from 50 to 1,500 byte packet sizes, normally one packet at a time but traffic can also burst (BGP) o User traffic is not allowed to use this service class RECOMMENDED DSCP marking is CS6 (Class Selector 6) RECOMMENDED Network Edge Conditioning: o At peering points (between two DiffServ networks) where SLAs are in place, CS6 marked packets are policed using a single rate with burst size (sr+bs) token bucket policer to keep the CS6 marked packet flows to within the traffic rate specified in the SLA o CS6 marked packet flows from untrusted sources (for example, end user devices) are dropped or remarked at ingress to DiffServ network. Packets from users are not permitted access to the Network Control or Administrative service classes The fundamental service offered to the Network Control service class is enhanced best effort service with high bandwidth assurance. Since this service class is used to forward both elastic and inelastic flows, the service SHOULD be engineered so the Active Queue Management [7] is applied to CS6 marked packets. Baker, et al. Expires August 13, 2004 [Page 20] Internet-Draft Document February 2004 If Administrative service class is not supported, then the Network Control service class MUST be used for both normal network control traffic and network administrative traffic defined in this document. Packets marked with CS7 DSCP use the same Per-Hop Behavior (PHB) as CS6 marked packets however, packets marked with CS7 DSCP MUST NOT be put through Active Queue Management (AQM). 4. User Traffic Categories User traffic is divided into four different categories, namely, interactive, responsive, timely and non-critical. An example of interactive traffic is traffic between two humans that is most sensitive to delay, loss and jitter; another example of interactive traffic is traffic between two servers where very low delay and loss are needed. Responsive traffic is typically between a human and a server but can also be between two servers; it is less affected by jitter and can tolerate longer delays than interactive traffic. Timely traffic is typically between two servers but can also be between a server and a human; the delay tolerance is significantly longer than for responsive traffic. Non-critical traffic is normally between servers where delivery may be delayed for period of time. The four traffic categories follow methodology defined by ITU-T Recommendation G.1010. End-to-end performance requirements for the listed service classes are currently being defined in ITU-T. Network administrators can categorize their applications based on the type of behavior that they require. Figure 1 provides some common applications and the forwarding service class that best supports them based on their performance requirements. In summary: o Telephony service class is best suited for applications that require very low delay and are of constant rate, such as IP telephony (VoIP) and circuit emulation over IP applications. o Multimedia Conferencing service class is best suited for applications that require very low delay but are of variable rate, such as video conferencing and interactive gaming. o Multimedia Streaming service class is best suited for streaming media applications where a human is waiting for outputs, such as broadcast TV, pay-per-view, video surveillance and security, etc. o Low Latency Data service class is best suited for data processing applications where a human is waiting for outputs, such as web-based ordering, EPR application, peer-to-peer signaling, etc. o High Throughput Data service class is best suited for store and forward applications such as FTP, billing record transfer, etc. o Standard service class is for traffic that has not been identified as requiring differentiated treatment and is normally referred as best effort. Baker, et al. Expires August 13, 2004 [Page 21] Internet-Draft Document February 2004 o Low Priority Data service class is intended for packet flows where bandwidth assurance is not required. Note, a network administrator MAY choose to support all or subsets of the defined service classes and provide service differentiation only to the applications/services that are mapped into them. 4.1 Interactive Traffic Category Interactive traffic category can be further split into two service classes, Telephony and Multimedia Conferencing to provide differentiation based on the different behavior of source traffic being forwarded. 4.1.1 Telephony Service Class The Telephony service class is RECOMMENDED for applications that require real-time, very low delay, very low jitter and very low packet loss for relatively constant-rate traffic sources (inelastic traffic sources). This service class MUST be used for IP telephony services. The fundamental service offered to traffic in the Telephony service class is a higher priority service than best-effort up to a specified upper bound with very low delay and very low packet loss. Operation is in some respect similar to an ATM CBR service, which has guaranteed bandwidth and which, if it stays within the negotiated rate, experiences nominal delay and no loss. The EF PHB has a similar guarantee. Typical configurations negotiate the setup of telephone calls over IP using protocols such as H.248, MEGACO, H.323 or SIP. When a user has been authorized to send telephony traffic, the call admission procedure should have verified that the newly admitted data rates will be within the capacity of the Telephony service class forwarding capability in the network that it will use. For VoIP (telephony) service, call admission control is usually performed by a telephony call server/gatekeeper using signaling (SIP, H.323, H.248, MEGACO, etc.) on access points to the network. The bandwidth in the core network and the number of simultaneous VoIP sessions that can be supported needs to be engineered and controlled so that there is no congestion for this service. Since RTP telephony flows do not react to loss or substantial delay in any substantive way, the Telephony service class SHOULD forward packet as soon as possible. The Telephony service class MUST use Expedited Forwarding (EF) PHB as defined in RFC 3246 [22] and MUST be configured to receive guaranteed forwarding resources so that all packets are forwarded quickly. The Baker, et al. Expires August 13, 2004 [Page 22] Internet-Draft Document February 2004 Telephony service class MUST be configured to use a Priority Queuing system such as defined in Section 1.2.1.1 of this document. The following application SHOULD use the Telephony service class: o VoIP (G.711, G.729 and other codecs) o Telephony (trunk and/or stimulus) signaling between end device (terminals/gateways) and the call server (H.248, MEGACO) o Voice-band data over IP (modem, fax) o T.38 fax over IP o Circuit emulation over IP, virtual wire, etc. o In wireless 3GPP applications, traffic that is mapped into the UMTS Conversational Traffic Class Traffic characteristics: o Mostly fixed size packets for VoIP (60, 70, 120 or 200 bytes in size) o Packets emitted at constant time intervals o Admission control of new flows is provided by telephony call server, media gateway, gatekeeper, edge router or access node that provides "middlebox" function. RECOMMENDED DSCP marking is EF for the following applications: o VoIP (G.711, G.729 and other codecs) o Voice-band data over IP (modem) o Circuit emulation over IP, virtual wire, etc. o Conversational UMTS Traffic Class RECOMMENDED DSCP marking is CS5 for the following applications: o Telephony (trunk and/or stimulus) signaling between end device (terminals/gateways) and the call server (H.248, MEGACO) o T.38 fax over IP Both EF and CS5 DS codepoints SHOULD be mapped into the Telephony service class and SHOULD used the Expedited Forwarding (EF) PHB. The CS5 DS codepoint is aliased to the EF codepoint and packets marked with CS5 are forwarded using the EF PHB. RECOMMENDED Network Edge Conditioning: o Packet flows from untrusted sources (end user devices) MUST be policed at ingress to DiffServ network using single rate with burst size token bucket policer to ensure that the telephony traffic stays within its negotiated bounds. o Packet flows from trusted sources (media gateways inside administered network) do not require policing. o Policing of Telephony packet flows across peering points where SLA is in place is not required as telephony traffic will be controlled by admission control mechanism between peering points. Baker, et al. Expires August 13, 2004 [Page 23] Internet-Draft Document February 2004 Note: On low speed links (typically access links below 1 Mbps), in the attempt to minimize jitter/delay, it is RECOMMENDED that packetized audio streams are separated from processed telephony data information flows like T.38 fax and telephony signaling and forwarded using less stringent (from delay/jitter perspective) service class. PCM voice when compressed produces very small packets (perhaps 60 bytes in size) where T.38 fax and signaling packets can be much bigger. The serialization delay and therefore delay/jitter, for the larger T.38 fax and signaling packets can be significantly bigger over low speed links then for 60 byte voice packets. For this reason it is RECOMMENDED for low speed links that packetized voice packets receive a higher priority forwarding treatment then the less sensitive from delay/jitter perspective T.38 fax and telephony signaling packets. PCM audio streams (voice) have a strict end-to-end delay constrain and SHOULD use Priority Queuing system whereas T.38 fax or telephony signaling have a more liberal jitter/delay constrain and SHOULD use a Rate Queuing system on access links below 1 Mbps. On higher speed links the difference in serialization delay is very small, so both types of telephony packet flows are aggregated in to a single forwarding service class to simplify network engineering and use a Priority Queuing system. Moreover, the forwarding of voice packets and signaling packets with the same very low delay forwarding service class minimizes delay as well as the difference in delay between signaling and bearer path, thereby virtually eliminating speech clipping and ring-clipping problems at start of a call when interfacing to PSTN. 4.1.2 Multimedia Conferencing Service Class The Multimedia Conferencing service class is RECOMMENDED for applications that requires real-time and low delay for variable rate elastic traffic sources. Video conferencing is such an application. The traffic sources (applications) in this traffic class have the capability to change their emission rate based on feedback received from the receiving end. Detection of packet loss by the receiver is sent using the applications control stream to the transmitter as an indication of possible congestion; the transmitter then selects a lower transmission rate based on pre-configured encoding rates (or transmission rates). Typical video conferencing configurations negotiate the setup of multimedia session using protocols such as H.323 or SIP. When a user/end-point has been authorized to start a multimedia session the admission procedure should have verified that the newly admitted data rates will be within the engineered capacity of the Multimedia Conferencing service class. The bandwidth in the core network and the number of simultaneous video conferencing sessions that can be Baker, et al. Expires August 13, 2004 [Page 24] Internet-Draft Document February 2004 supported SHOULD to be engineered to control traffic load for this service. The Multimedia Conferencing service class SHOULD use the Assured Forwarding (AF) PHB defined in RFC 2597 [12]. This service class SHOULD be configured to provide a bandwidth assurance for AF41, AF42, and AF43 marked packets to ensure that they get forwarded. The Multimedia Conferencing service class SHOULD be configured to use a Rate Queuing system such as defined in Section 1.2.1.2 of this document. The following application SHOULD use the Multimedia Conferencing service class: o Video conferencing (interactive video) o Interactive gaming o Server to server data transfer requiring very low delay o IP VPN service that specifies two rates and mean network delay that is slightly longer then network propagation delay. o Interactive, time critical and mission critical applications. o In wireless 3GPP applications, traffic that is mapped into the UMTS Interactive Traffic Class with Traffic Handling Priority 1 (THP=1). Traffic characteristics: o Variable size packets (50 to 1500 bytes in size) o Higher the rate, higher is the density of large packets o Variable packet emission time o Source is capable of reducing its transmission rate based on detection of packet loss at the receiver RECOMMENDED DSCP marking: o Interactive gaming packets are marked with AF41 o Video conferencing packets are marked with AF4x o VPN service may be marked with AF4x, depending on the service characteristics o Server to server data transfer with AF4x, depending on the service characteristics o UMTS Interactive THP=1 packets are marked with AF4x Packet flows from video conferencing equipment MAY be marked at source by the video conferencing equipment or by the edge router using a Two Rate Three Color Marker (trTCM) RFC 2698 [14]. RECOMMENDED DSCP marking when performed by video conferencing equipment: o AF41 = H.323 video conferencing audio stream RTP/UDP o AF41 = H.323 video conferencing video control RTCP/TCP Baker, et al. Expires August 13, 2004 [Page 25] Internet-Draft Document February 2004 o AF41 = H.323 video conferencing video stream below specified rate "A" o AF42 = H.323 video conferencing video stream between specified rate "A" and "B" o AF43 = H.323 video conferencing video stream above specified rate "B" o Where rate "B" is greater in magnitude than rate "A" RECOMMENDED Conditioning Performed at DiffServ Network Edge: The Two Rate Three Color Marker (trTCM) SHOULD be used as specified in RFC 2698 [14]. If packets are marked by the sources or previous DiffServ domain, then the trTCM SHOULD be configured to operate in Color-Aware mode. If the packets are not marked by the source or previous DiffServ domain, then the trTCM MUST be configured to operate in Color-Blind mode. The fundamental service offered to "Multimedia Conferencing" traffic is enhanced best effort service with controlled rate and delay. Some traffic in this service class may not respond dynamically to packet loss. For video conferencing service, typically a 1% packet loss detected at the receiver triggers an encoding rate change, dropping to next lower provisioned video encoding rate. As such, Active Queue Management [7] SHOULD be used primarily to switch video encoding rate under congestion, changing from high rate to lower rate i.e. 1472 kbps to 768 kbps. The probability of loss of AF41 traffic MUST NOT exceed the probability of loss of AF42 traffic, which in turn MUST NOT exceed the probability of loss of AF43 traffic. 4.2 Responsive Traffic Category Responsive traffic category can be further split into two service classes, Multimedia Streaming and Low Latency Data to provide differentiation based on the different behavior of source traffic being forwarded. 4.2.1 Multimedia Streaming Service Class The Multimedia Streaming service class is RECOMMENDED for applications that require near-real-time packet forwarding of variable rate traffic sources that are not as delay sensitive as applications using the Multimedia Conferencing service class. Such applications include broadcast TV, streaming audio and video, video (movies) on demand and surveillance video. In general, the Multimedia Streaming service class assumes that the traffic is buffered at the source/destination and therefore, is less sensitive to delay and jitter. Baker, et al. Expires August 13, 2004 [Page 26] Internet-Draft Document February 2004 The Streaming service class SHOULD use the Assured Forwarding (AF) PHB defined in RFC 2597 [12]. This service class SHOULD be configured to provide a minimum bandwidth assurance for AF31, AF32, AF33 and CS4 marked packets to ensure that they get forwarded. The Streaming service class SHOULD be configured to use Rate Queuing system such as defined in Section 1.2.1.2 of this document. The following applications SHOULD use the Multimedia Streaming service class: o Video surveillance and security (unicast) o TV broadcast including HDTV (multicast) o Pay per view movies and events (pre scheduled) o Video on demand (unicast) with control (virtual DVD) o Streaming audio (unicast) o Streaming video (unicast) o Web casts o VPN service that supports different levels of flow assurance o In wireless 3GPP applications, traffic that is mapped into the UMTS Streaming Traffic Class Traffic characteristics: o Variable size packets (50 to 4196 bytes in size) o Higher the rate, higher density of large packets o Variable packet emission rate o Some bursting at start of flow from some applications o At about 2% packet loss, a video session is usually terminated Both the AF3x and CS4 DS codepoints SHOULD be mapped into the Multimedia Streaming service classes and used the Assured Forwarding (AF) PHB. The CS4 DS codepoint is aliases to the AF31 DS codepoint and packets marked with CS4 are forwarded using the AF31 PHB. However, Active Queue Management (AQM) MUST NOT be applied in the router(s) to CS4 market packets. Applications or end systems SHOULD pre-mark their packets with DSCP values as shown in Figure 5. If a host is unable to pre-mark their packets, then marking MUST be performed in the DiffServ edge router using MF classification. Due to the nature of the service, it is RECOMMENDED that video surveillance and security flows are marked with a different DSCP value so that traffic conditioning and policing policies can be different from other flows in the Multimedia Streaming service class. Baker, et al. Expires August 13, 2004 [Page 27] Internet-Draft Document February 2004 ------------------------------------------------------------------ | Applications | Protocol |DSCP| |------------------------------------+------------------------+----| |Video surveillance and security |For RTP/UDP payload and |CS4 | | (unicast) |RTSP/TCP control streams| | |------------------------------------+------------------------+----| |TV broadcast (multicast), pay per |For RTP/UDP payloads and| | |view movies and events (multicast) |RTSP/TCP control streams|AF31| |Video on demand(unicast)with control| | | |------------------------------------+------------------------+----| | | For RTP/UDP streams |AF33| | |------------------------+----| | Video clips (unicast), premium WEB | For RTP/TCP streams |AF32| | casts, etc. |------------------------+----| | | RTP/TCP or HTTP control|AF32| |------------------------------------+------------------------+----| | | For RTP/UDP streams |AF33| | |------------------------+----| | Audio streaming (unicast) | For RTP/TCP streams |AF32| | |------------------------+----| | |RTSP/TCP or HTTP control|AF31| |------------------------------------+------------------------+----| | VPN service that support different | |AF31| | levels of assurance |Implementation dependent|AF32| | | |AF33| |------------------------------------+------------------------+----| | | |AF31| | UMTS Streaming packets | GPRS tunnel over IP |AF32| | | |AF33| ------------------------------------------------------------------ Figure 5: DSCP marking for Multimedia Streaming RECOMMENDED Network Edge Conditioning: Packet flows from untrusted sources MUST be policed at the DiffServ network edge using single rate policers with a burst size control for AF31, AF32, AF33 and CS4 marked packets. Policing policy is based on the SLA for supported application(s). For the above defined applications, three single rate policers with burst size control SHOULD be provided; one for CS4 marked packets, another for AF31 marked packets and the third policer for AF32 and AF33 marked packets. Packet flows from trusted sources (e.g., TV broadcast servers) normally do not require policing. The fundamental service offered to "Multimedia Streaming" traffic is enhanced best effort service with controlled rate and delay. This traffic does not respond dynamically to packet loss. Packets marked with AF31 and CS4 DSCP require very high assurance of delivery. Baker, et al. Expires August 13, 2004 [Page 28] Internet-Draft Document February 2004 Packets marked with AF32 and AF33 can generally tolerated up to 1% and 2% packet loss respectively. As such, Active Queue Management [7] SHOULD be used primarily to reduce the number of flows at congestion points by dropping packets from less important flows first before any AF31 and CS4 marked packets are dropped. The service SHOULD be provisioned so that AF31 and CS4 marked packet flows have high assurance for bandwidth in the network. The probability of loss of AF31 traffic MUST NOT exceed the probability of loss of AF32 traffic, which in turn MUST NOT exceed the probability of loss of AF33. Packets marked with CS4 DSCP (Video surveillance and security packets) SHOULD NOT be put through Active Queue Management function. 4.2.2 Low Latency Data Service Class The Low Latency Data service class is RECOMMENDED for elastic and responsive typically client/server based applications. Applications forwarded by this service class are those requiring a relatively fast responses and typically have asymmetrical bandwidth need, i.e. the client typically sends a short message to the server and the server responds with a much larger data flow back to the client. The most common example of this is when a user clicks a hyperlink (~few dozen bytes) on a web page resulting in a new web page to be loaded (Kbytes of data). This service class is configured to provide good response for TCP [3] short lived flows that require real-time packet forwarding of variable rate traffic sources. The Low Latency Data service class MUST use the Assured Forwarding (AF) PHB defined in RFC 2597 [12]. This service class SHOULD be configured to provide a minimum bandwidth assurance for AF21, AF22, AF23 and CS3 marked packets to ensure that they get forwarded. The Low Latency Data service class MUST be configured to use a Rate Queuing system such as defined in Section 1.2.1.2 of this document. The following applications SHOULD use the Low Latency Data service class: o Client/server applications o SNA terminal to host transactions (SNA over IP using DLSw) o Web based transactions (E-commerce) o Credit card transactions o Financial wire transfers o ERP applications (e.g., SAP/BaaN) o Peer-to-peer signaling (SIP, H.323) o VPN service that supports CIR (Committed Information Rate) with up to two burst sizes o In wireless 3GPP applications, traffic that is mapped into the UMTS Interactive Traffic Class with Traffic Handling Priority 2 (THP=2) Baker, et al. Expires August 13, 2004 [Page 29] Internet-Draft Document February 2004 Traffic characteristics: o Variable size packets (50 to 1500 bytes in size) o Variable packet emission rate o With packet bursts of TCP window size o Source capable of reducing its transmission rate based on detection of packet loss at the receiver or through explicit congestion notification Both the AF2x and CS3 DS codepoints SHOULD be mapped into the Low Latency Data service classes and use the Assured Forwarding (AF) PHB. However, Active Queue Management (AQM) MUST NOT be applied in router(s) to CS3 market packets. RECOMMENDED DSCP marking: o Peer-to-peer inelastic SIP, H.323 signaling packet flows are marked with CS3 o Elastic TCP flows are marked with AF2x o VPN service may be marked with AF2x or CS3 depending on the service characteristics o UMTS Interactive THP=2 packets are marked with AF2x Marking of the DSCP MAY be performed by a host or by an edge router. RECOMMENDED Conditioning Performed at the DiffServ Network Edge: Conditioning MAY be performed on per-flow or on aggregated-flows depending on the configuration and service offered. Metering and (re)marking of flows is REQUIRED at DiffServ edge nodes and at DiffServ boundary nodes. The Low Latency Data service class SHOULD use a Single Rate Three Color Marker (srTCM) conditioner for AF2x flows. RECOMMENDED Conditioning Requirements for AF2x marked packets: o Conditioning of aggregated packet flows destined for the Low Latency Data service class MUST be performed at the DiffServ edge of the network. Furthermore, conditioning SHOULD be performed using Single Rate Three Color Marker (srTCM) as defined in RFC 2697 [13]. o If the packets are not pre-marked then the srTCM MUST be configured to operate in the Color-Blind mode. o If the packets are pre-marked by the source or previous network (boundary node) then the srTCM SHOULD be configured to operate in the Color-Aware mode. RECOMMENDED Conditioning Requirements for CS3 marked packets: o DiffServ edge and boundary nodes MUST police CS3 marked packets so both rate and burst size can be enforced. The fundamental service offered to "Low Latency Data" traffic is Baker, et al. Expires August 13, 2004 [Page 30] Internet-Draft Document February 2004 enhanced best effort service with controlled rate and delay. The service SHOULD be engineered so that AF21 and CS3 marked packet flows have sufficient bandwidth in the network to provide high assurance of delivery. Since the AF2x traffic is elastic and responds dynamically to packet loss, Active Queue Management [7] SHOULD be used primarily to control TCP flow rates at congestion points by dropping packet from TCP flows where the burst length is high. The probability of loss of AF21 traffic MUST NOT exceed the probability of loss of AF22 traffic, which in turn MUST NOT exceed the probability of loss of AF23. Active queue management MAY also be implemented using Explicit Congestion Notification (ECN) RFC 3168 [17]. Packets marked with CS3 DSCP (SIP signaling packets) MUST NOT be put through Active Queue Management [7] function. 4.3 Timely Traffic Category Timely traffic category can be further split into two service classes, High Throughput Data and Standard to provide differentiation based on the different behavior of source traffic being forwarded. 4.3.1 High Throughput Data Service Class The High Throughput Data service class is RECOMMENDED for elastic applications that require timely packet forwarding of variable rate traffic sources and more specifically is configured to provide good throughput for TCP longer lived flows. TCP [3] or a transport with a consistent Congestion Avoidance Procedure [10][11] normally will drive as high a data rate as it can obtain over a long period of time. The FTP protocol is a common example, although one cannot definitively say that all FTP transfers are moving data in bulk. The High Throughput Data service class MUST use the Assured Forwarding (AF) PHB defined in RFC 2597 [12]. This service class SHOULD be configured to provide a minimum bandwidth assurance for AF11, AF12, AF13 and CS2 marked packets to ensure that they are forwarded. The High Throughput Data service class MUST be configured to use a Rate Queuing system such as defined in Section 1.2.1.2 of this document. The following applications SHOULD use the High Throughput Data service class: o Store and forward applications o File transfer applications o Email o Non-critical OAM&P (Operation and Management and Provisioning) using SNMP, XML, etc. Baker, et al. Expires August 13, 2004 [Page 31] Internet-Draft Document February 2004 o VPN service that supports CIR (Committed Information Rate) with up to two burst sizes o In wireless 3GPP applications, traffic that is mapped into the UMTS Interactive Traffic Class with Traffic Handling Priority 3 (THP=3) Traffic characteristics: o Variable size packets (50 to 1500 bytes in size) o Variable packet emission rate o With packet bursts of TCP window size o Source capable of reducing its transmission rate based on detection of packet loss at the receiver or through explicit congestion notification Both the AF1x and CS2 DS codepoints SHOULD be mapped into the High Throughput Data service classes and use the Assured Forwarding (AF) PHB. However, Active Queue Management (AQM) MUST NOT be applied in router(s) to CS2 marked packets. RECOMMENDED DSCP marking: o Non-critical OAM&P (SNMP, XML, etc.) packets are marked with CS2 o Elastic TCP flows are marked with AF1x o VPN service may be marked with AF1x or CS2 depending on the service characteristics o UMTS Interactive THP=3 packets are marked with AF1x Note: Since the performance requirements for non-critical OAM&P traffic can be met with the High Throughput Data service class and the amount of non-critical OAM&P traffic is normally very small, we recommend that non-critical OAM&P traffic be marked with CS2 DSCP and forwarded using the High Throughput Data service class. The marking of non-critical OAM&P traffic with CS2 DS codepoint is recommended so that different conditioning, policing and queue management policies can be used for non-critical OAM&P. Marking of the DSCP MAY be performed by a host or by an edge router. RECOMMENDED Conditioning Performed at the DiffServ Network Edge: Conditioning MAY be performed on per-flow or for aggregated flows depending on the configuration and the service offered. Metering and (re)marking of DSCP is REQUIRED at the DiffServ edge node and on the DiffServ boundary node. The High Throughput Data service class SHOULD use a Single Rate Three Color Marker (srTCM) conditioner for AF1x flows and a single rate policer with a burst size limit for CS2 flows. RECOMMENDED Conditioning Requirements for AF1x marked Packets: Baker, et al. Expires August 13, 2004 [Page 32] Internet-Draft Document February 2004 Conditioning of aggregated packet flows destined for the High Throughput Data service class MUST be performed at the DiffServ edge of the network. Furthermore, conditioning SHOULD be performed as defined in RFC 2697 [13]. If the packets are not pre-marked, then the srTCM MUST be configured to operate in the Color-Blind mode. If the packets are pre-marked by the source or previous network (boundary node) the srTCM SHOULD be configured to operate in the Color-Aware mode. RECOMMENDED Conditioning Requirements for CS2 marked Packets: DiffServ edge and boundary nodes MUST police CS2 marked packets so both rate and burst size can be enforced The fundamental service offered to "High Throughput Data" traffic is enhanced best effort service with a specified minimum rate. It can be assumed that this class will consume any available bandwidth, and packets traversing congested links may experience higher queuing delays and/or packet loss. Typical configurations use Explicit Congestion Notification [17] or random packet dropping to implement Active Queue Management [7] and MAY impose a minimum or maximum rate. The probability of loss of AF11 traffic MUST NOT exceed the probability of loss of AF12 traffic, which in turn MUST NOT exceed the probability of loss of AF13 traffic. Ingress traffic conditioning passes traffic in the class up to some specified threshold marked as AF11, additional traffic up to some secondary threshold marked as AF12, and potentially passes additional traffic marked as AF13. In such a case, if one network customer is driving significant excess and another seeks to use the link, any losses will be experienced by the high rate user, causing him to reduce his rate. Packets marked with CS2 DSCP (OAM&P packets) MUST NOT be put through Active Queue Management [7] function. 4.3.2 Standard Service Class The Standard service class is RECOMMENDED for traffic that has not been classified into one of the other supported forwarding service classes in the DiffServ network domain. This service class provides the Internet's "best effort" forwarding behavior. This service class typically has no bandwidth, delay, loss or jitter assurances. The Standard service class MUST use the Default Forwarding (DF) PHB defined in RFC 2474 [8] and SHOULD be configured to receive a small percentage of forwarding resources (at least 5%). This service class MUST be configured to use a Rate Queuing system such as defined in Baker, et al. Expires August 13, 2004 [Page 33] Internet-Draft Document February 2004 Section 1.2.1.2 of this document. The following application SHOULD use the Standard service class: o Any undifferentiated application/packet flow transported through the DiffServ enabled network o In wireless 3GPP applications, traffic that is mapped into the UMTS Background Traffic Class Traffic Characteristics: o Non deterministic, mixture of everything RECOMMENDED DSCP marking is DF (Default Forwarding) Network Edge Conditioning: There is no requirement that conditioning of packet flows be performed for this service class The fundamental service offered to the Standard service class is best effort service with active queue management to limit over-all delay. Typical configurations SHOULD use Explicit Congestion Notification [17] or random packet dropping to implement Active Queue Management [7], and MAY impose a minimum or maximum rate on the queue. 4.4 Non Critical Traffic Catgegory Non-critical traffic category currently has only one service class defined for differentiation from Standard traffic. When a need arise other service class could be defined in the future. 4.4.1 Low Priority Data The Low Priority Data service class serves applications that run over TCP [2] or a transport with a consistent congestion avoidance procedure [10][11], and which the user is willing to accept service without guarantees. This service class is specified in [24] and RFC 3662 [23]. The following applications MAY use the Low Priority Data service class: o Any TCP based application/packet flow transported through the DiffServ enabled network that does not require any bandwidth assurances Traffic Characteristics: o Non real-time and elastic Network Edge Conditioning: Baker, et al. Expires August 13, 2004 [Page 34] Internet-Draft Document February 2004 There is no requirement that conditioning of packet flows be performed for this service class RECOMMENDED DSCP marking is CS1 (Class Selector 1) The fundamental service offered to the Low Priority Data service class is best effort service with zero bandwidth assurance. By placing it into a separate queue or class, it may be treated in a manner consistent with a specific service level agreement. Typical configurations SHOULD use Explicit Congestion Notification [17] or random loss to implement Active Queue Management [7]. 5. Mapping Applications to Service Classes Here we provide some examples for mapping different applications into the defined service classes. Mapping for Signaling: There are many different signaling protocols, ways that signaling is used and performance requirements from applications that are controlled by these protocols. Therefore we have determined that the different signaling protocols be mapped to service classes that best meet the objectives. The following mapping is recommended: SIP and H.323 are forwarded using Low Latency Data service class H.248 and MEGACO are forwarded using the Telephony service class SIP-T signaling between call servers in carrier's network using Network Control service class. RSVP signaling, depends on the application. If RSVP signaling is "on-path" as used in IntServ or NSIS, than it needs to be forwarded from the same queue (service class) as application data that it is controlling. If it is "off-path" (not along the same path as its applications data) then, Low Latency Data service class should be used for RSVP signaling. Mapping for NTP: From tests that were performed, indications are that precise time distribution requires a very low packet delay variation (jitter) transport. Therefore we would suggest the following guidelines for NTP be used: When NTP is used for providing high accuracy timing within administrator's (carrier's) network or to end users/clients, the Telephony service class should be used and NTP packets be marked with CS5 DSCP. For applications that require "wall clock" timing accuracy, the Standard service class should be used and packets should be marked Baker, et al. Expires August 13, 2004 [Page 35] Internet-Draft Document February 2004 with DF DSCP. 6. Security Considerations This document discusses policy, and describes a common policy configuration, for the use of a Differentiated Services Code Point by transports and applications. If implemented as described, it should require the network to do nothing that the network has not already allowed. If that is the case, no new security issues should arise from the use of such a policy. It is possible for the policy to be applied incorrectly, or for a wrong policy to be applied in the network for the defined service class. In that case, a policy issue exists that the network must detect, assess, and deal with. This is a known security issue in any network dependent on policy directed behavior. A well known flaw appears when bandwidth is reserved or enabled for a service (for example, voice transport) and another service or an attacking traffic stream uses it. This possibility is inherent in DiffServ technology, which depends on appropriate packet markings. When bandwidth reservation or a priority queuing system is used in a vulnerable network, the use of authentication and flow admission is recommended. To the author's knowledge, there is no known technical way to respond to an unauthenticated data stream using service that it is not intended to use, and such is the nature of the Internet. 7. Achnoledgements The authors acknowledge a great many inputs, most notably from Bruce Davie, Dave Oran, Ralph Santitoro, Gary Kenward, Francois Audet, Brian E Carpenter, Morgan Littlewood, Robert Milne, John Shuler, Nalin Mistry and Al Morton. Kimberly King, Joe Zebarth and Alistair Munroe each did a thorough proof-reading, and the document is better for their contributions. Normative References [1] Postel, J., "Internet Protocol", STD 5, RFC 791, September 1981. [2] Postel, J., "Transmission Control Protocol", STD 7, RFC 793, September 1981. [3] Braden, B., Clark, D. and S. Shenker, "Integrated Services in the Internet Architecture: an Overview", RFC 1633, June 1994. [4] Bradner, S., "Key words for use in RFCs to Indicate Requirement Baker, et al. Expires August 13, 2004 [Page 36] Internet-Draft Document February 2004 Levels", BCP 14, RFC 2119, March 1997. [5] Braden, B., Zhang, L., Berson, S., Herzog, S. and S. Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification", RFC 2205, September 1997. [6] Baker, F., Krawczyk, J. and A. Sastry, "RSVP Management Information Base using SMIv2", RFC 2206, September 1997. [7] Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J. and L. Zhang, "Recommendations on Queue Management and Congestion Avoidance in the Internet", RFC 2309, April 1998. [8] Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, December 1998. [9] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W. Weiss, "An Architecture for Differentiated Services", RFC 2475, December 1998. [10] Allman, M., Paxson, V. and W. Stevens, "TCP Congestion Control", RFC 2581, April 1999. [11] Floyd, S. and T. Henderson, "The NewReno Modification to TCP's Fast Recovery Algorithm", RFC 2582, April 1999. [12] Heinanen, J., Baker, F., Weiss, W. and J. Wroclawski, "Assured Forwarding PHB Group", RFC 2597, June 1999. [13] Heinanen, J. and R. Guerin, "A Single Rate Three Color Marker", RFC 2697, September 1999. [14] Heinanen, J. and R. Guerin, "A Two Rate Three Color Marker", RFC 2698, September 1999. [15] Herzog, S., "RSVP Extensions for Policy Control", RFC 2750, January 2000. [16] Bernet, Y., "Format of the RSVP DCLASS Object", RFC 2996, November 2000. [17] Ramakrishnan, K., Floyd, S. and D. Black, "The Addition of Explicit Congestion Notification (ECN) to IP", RFC 3168, September 2001. Baker, et al. Expires August 13, 2004 [Page 37] Internet-Draft Document February 2004 [18] Baker, F., Iturralde, C., Le Faucheur, F. and B. Davie, "Aggregation of RSVP for IPv4 and IPv6 Reservations", RFC 3175, September 2001. [19] Herzog, S., "Signaled Preemption Priority Policy Element", RFC 3181, October 2001. [20] Yadav, S., Yavatkar, R., Pabbati, R., Ford, P., Moore, T., Herzog, S. and R. Hess, "Identity Representation for RSVP", RFC 3182, October 2001. [21] Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J. and S. Waldbusser, "Terminology for Policy-Based Management", RFC 3198, November 2001. [22] Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, J., Courtney, W., Davari, S., Firoiu, V. and D. Stiliadis, "An Expedited Forwarding PHB (Per-Hop Behavior)", RFC 3246, March 2002. [23] Bless, R., Nichols, K. and K. Wehrle, "A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services", RFC 3662, December 2003. [24] "QBone Scavenger Service (QBSS) Definition", Internet2 Technical Report Proposed Service Definition, March 2001. Informative References [25] Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R. and A. Sastry, "The COPS (Common Open Policy Service) Protocol", RFC 2748, January 2000. [26] Bernet, Y. and R. Pabbati, "Application and Sub Application Identity Policy Element for Use with RSVP", RFC 2872, June 2000. [27] Bonaventure, O. and S. De Cnodder, "A Rate Adaptive Shaper for Differentiated Services", RFC 2963, October 2000. [28] Chan, K., Seligson, J., Durham, D., Gai, S., McCloghrie, K., Herzog, S., Reichmeyer, F., Yavatkar, R. and A. Smith, "COPS Usage for Policy Provisioning (COPS-PR)", RFC 3084, March 2001. [29] Nichols, K. and B. Carpenter, "Definition of Differentiated Services Per Domain Behaviors and Rules for their Specification", RFC 3086, April 2001. Baker, et al. Expires August 13, 2004 [Page 38] Internet-Draft Document February 2004 Authors' Addresses Fred Baker Cisco Systems 1121 Via Del Rey Santa Barbara, CA 93117 US Phone: +1-408-526-4257 Fax: +1-413-473-2403 EMail: fred@cisco.com Jozef Babiarz Nortel Networks 3500 Carling Avenue Ottawa, Ont. K2H 8E9 Canada Phone: +1-613-763-6098 Fax: +1-613-768-2231 EMail: babiarz@nortelnetworks.com Kwok Ho Chan Nortel Networks 600 Technology Park Drive Billerica, MA 01821 US Phone: +1-978-288-8175 Fax: +1-978-288-4690 EMail: khchan@nortelnetworks.com Baker, et al. Expires August 13, 2004 [Page 39] Internet-Draft Document February 2004 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. Full Copyright Statement Copyright (C) The Internet Society (2004). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assignees. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION Baker, et al. Expires August 13, 2004 [Page 40] Internet-Draft Document February 2004 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Baker, et al. Expires August 13, 2004 [Page 41]