Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Next Steps in QoS Signalling:Do we need RSVP version 2?
Marcus Brunner, Rosella Greco, Juergen QuittekNetwork Laboratories, NEC Europe Ltd.
Heidelberg, Germany{brunner,greco,quittek}@ccrle.nec.de
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 2
Resource reSerVation Protocol (RSVP)
• Hop-by-hop protocol• Routing protocol independent• Path-coupled (“in-band” signaling)• Sender advertisements• Receiver-issued reservations• Soft state design• Support for multicast
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 3
RSVP Signaling
Sender ReceiverRouter
PATH PATHRESV RESV
Data Data
PATH PATHRESV RESV
Init
Refresh
Transmit
RESV Tear RESV Tear Terminate
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 4
RSVP Issues under Discussion
• No direct support for mobile terminals• Multicast support• End-to-end• Coupled reservation identifier and flow identifier• Uni-directional reservation• Receiver-orientation• Soft state• Path-coupled (“in-band”) reservation• Scalability• Complexity of implementation
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 5
Scalability and Complexity
• Complexity of implementation– large state machine
• support of multicast
– several message types
• Scalability– per-flow reservation
• potential overload of RSVP signaling daemon (soft state)• timer per flow
– per-flow traffic handling not applicable to backbone core routers: too many flows
• potential overload of classifier• potential overload of scheduler (number of queues)
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 6
Next Steps In Signaling (NSIS):Do we need RSVP version 2?
• Investigated by the IETF NSIS WG– started in December 2001
• Major contributors include Nokia, Siemens, Ericsson, Alcatel, NEC
• Requirements analysis– selection of scenarios
• Framework development
==> Decision
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 7
Entity Roles
Application
InitiatorFor-
warder
Application
For-warder
Res-ponder
…
Involved Entities
Resourcemgmt.
function
Resourcemgmt.
function
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 8
Considered Scenarios
• Terminal mobility – initiator and/or responder– sender and/or receiver
• Cellular network• UMTS access network• Session mobility• Reservation from access to core network• QoS negotiation and reservation across
administrative boundaries• QoS signaling between PSTN gateways and IP
backbone• PSTN trunking gateway• Application requested end-to-end QoS
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 9
Requirements for RSVPv2
• Not just pure protocol requirements, also framework and architecture requirements
• Some might be technically contradictory• Categories
– Architecture and design goals– Signaling Flow– Additional service information– Control information– Performance– Flexibility– Security– Mobility– Inter-working with other protocols and techniques– Operational requirements
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 10
Architecture and Design Goals
• Applicability to different QoS technologies• Resource availability information on request• Modular design• Extensibility, even for non-QoS purposes• Clear separation of signaling protocol and carried
control information: extensibility, safety• Independence of signaling and QoS provisioning
paradigm• Application independence
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 11
Signaling Flow
• Free placement of signaling end points– End-to-end, end-to-edge,
edge-to-edge, network-to-network
• No constraint of the signaling and the forwarders to be in data path
• Concealment of topology and technology information
• Support of hierarchical reservation scenarios
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 12
Additional Service Information
• Explicit release of resources• Automatic release of resources• Upstream notifications• Feedback on success of service request• Local information exchange
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 13
Control Information
• Mutability information on parameters• Possibility to add and remove local domain
information• Independence of reservation identifier and flow
identifier• Seamless modification of resource reservation• Grouping of signaling for several micro-flows
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 14
Performance
• Scalability• Low setup latency• Low bandwidth consumption of signaling• Ability to constrain load on devices• Highest possible network utilization
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 15
Flexibility
• Flow aggregation• Placement of initiator• Initiation of re-negotiation• uni-directional and bi-directional reservation
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 16
Security
• Authentication of resource requests• Resource authorization• Integrity protection• Replay protection• Hop-by-hop security• Identity confidentiality• Location privacy• Prevention of denial-of-service attacks• Confidentiality of signaling messages• Ownership of reservations• Hooks for authentication and key management
protocols
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 17
Mobility
• Allow efficient QoS re-establishment after hand-over
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 18
Inter-working with other protocols and techniques
• Inter-work with IP tunneling• IPv4 and IPv6• independent of charging model• Hooks for AAA protocols• Inter-work with seamless hand-over protocols• Inter-work with non-traditional IP routing
• Ability to assign transport quality to signaling messages
• Graceful fail-over
Operational Requirements
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 19
Conclusion on QoS Requirements
• Meeting all of them might be not desirable– too complex– one size fits all not necessarily a good idea– some are classified as “SHOULD” or “MAY”
• Note, that there is no requirement for multicast• Being aware of all requirements is very useful
when designing your own QoS signaling protocol• A careful selection is necessary
– Which application scenario is in your focus?– Which requirements harmonize and integrate
well?
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 20
Non-QoS Issues
• Extending the extensibility requirement• Middlebox configuration
– Implicitly or explicitly request configuration of• Firewalls on the data path• network address translators on the data path
– They are big obstacles for UDP-based services
• Gateway configuration
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 21
A Simple Design Example
• Scenarios:– Wireless mobile terminals– IP telephony
• Design Goals and Choices– Coexistence with RSVPv1 – Uni-cast reservations only– Sender-oriented approach – Small and efficient core protocol
+ service specific part– path-coupled and path-decoupled signaling– Flow ID separated from reservation ID– Soft-state
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 22
Message Types
• RESV • ACK/NACK• REFRESH• TEAR DOWN
IPv4 SRC ADD
IPv4 DEST ADD
SRC PORTDEST PORT
V FL TYPE TTL LEN
SERVICE TYPESERVICE SPEC
HEADER
FLOW IDRESV ID
TIME VALUE
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 23
Basic protocol operations
ResvResv RequestRequest
Acknowlegment
Acknowlegment
SourceSource
DestinationDestination
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 24
Mobile Scenario
Laptop
Router
RouterCC
Router
Router
Router
Router
Router
Router
AAAA
BB
Re-use of not affected reservations
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 25
Network with centralised management of resources
Data path Data path
Signaling Signaling pathpath
IntraIntra--domain resource domain resource reservationreservation
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 26
Implementation issues
The protocol has been implemented in C++• One timer for each RSVPv2 daemon• Few state information saved• QoS signaling (type of services)
– Assured Bandwidth – Integrated Service: Guaranteed Load and
Assured Service (Same as RSVP)– DiffServ Interoperability
• Implicit Firewall and NAT configuration• IPv4 only
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 27
Performance Studies
• Small testbed with 4 PC: – 2 terminals, 2 DiffServ routers
• Protocol performance compared with the RSVP KOM Engine developed by the Darmstadt University
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 28
Setup time
Time needed to set up a reservation in the real testbed.
0
50
100
150
200
250
300
350
1 5000 10000 16000 21000 26000 31000
numbers of flows
time
in m
s
RSVPv2
RSVPv1
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 29
CPU usage and Memory
• CPU usage • Memory usage
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 30
Other measurements
• CPU load in the topology
• Communication overhead for signaling:
Number of Bytes used to set up a reservation, refresh it 10 times and tear it down.
0
1000000
2000000
3000000
4000000
5000000
6000000
1 100 500 1000 5000 10000
numbers of flows
over
head
in B
ytes
RSVPv1
RSVPv2
EndEnd systemsystemCore networkCore network
EndEnd systemsystem
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 31
General Conclusion
• We do not need a completely different protocol.• We learned a lot from using and studying RSVP,
now we should make use of this when evolving it.• The list of requirements we can identify is long.• We should carefully select scenarios and a
requirements set when designing a new protocol.• Support for mobility becomes essential.• Openness to supporting non-QoS signaling is
highly desirable.• Reservation should not be restricted to end-to-
end.
© NEC Europe Ltd., 2002Network Laboratories, Heidelberg 32
Technical Conclusion
• Separation of reservation ID and flow ID is essential for mobile QoS.
• Separation of signaling and control information allows to support non-QoS signaling.
• Path-decoupled signaling can be integrated with reasonable effort.
• Omitting multicast reduces complexity and resource consumption.
• However, without omitting soft state, no significant improvement of performance can be achieved.