Difference between revisions of "RFC5670"

From RFC-Wiki
imported>Admin
(Created page with " Network Working Group P. Eardley, Ed.Request for Comments: 5670 BTCategory: Standards Track...")
 
Line 1: Line 1:
 +
Network Working Group                                    P. Eardley, Ed.
 +
Request for Comments: 5670                                            BT
 +
Category: Standards Track                                  November 2009
  
 +
          Metering and Marking Behaviour of PCN-Nodes
  
 
 
 
 
Network Working Group                                    P. Eardley, Ed.Request for Comments: 5670                                            BTCategory: Standards Track                                  November 2009
 
 
          Metering and Marking Behaviour of PCN-Nodes
 
 
Abstract
 
Abstract
  
Line 35: Line 32:
 
document authors.  All rights reserved.
 
document authors.  All rights reserved.
  
This document is subject to [[BCP78|BCP 78]] and the IETF Trust's Legal
+
This document is subject to BCP 78 and the IETF Trust's Legal
 
Provisions Relating to IETF Documents
 
Provisions Relating to IETF Documents
 
(http://trustee.ietf.org/license-info) in effect on the date of
 
(http://trustee.ietf.org/license-info) in effect on the date of
Line 49: Line 46:
 
10, 2008.  The person(s) controlling the copyright in some of this
 
10, 2008.  The person(s) controlling the copyright in some of this
 
material may not have granted the IETF Trust the right to allow
 
material may not have granted the IETF Trust the right to allow
 
 
 
 
  
 
modifications of such material outside the IETF Standards Process.
 
modifications of such material outside the IETF Standards Process.
Line 61: Line 54:
 
it for publication as an RFC or to translate it into languages other
 
it for publication as an RFC or to translate it into languages other
 
than English.
 
than English.
 +
 +
Table of Contents
 +
 +
1. Introduction ....................................................2
 +
  1.1. Terminology ................................................4
 +
        1.1.1. Requirements Language ...............................5
 +
2. Specified PCN-Metering and -Marking Behaviours ..................5
 +
  2.1. Behaviour Aggregate Classification Function ................5
 +
  2.2. Dropping Function ..........................................5
 +
  2.3. Threshold-Meter Function ...................................6
 +
  2.4. Excess-Traffic-Meter Function ..............................6
 +
  2.5. Marking Function ...........................................7
 +
3. Security Considerations .........................................7
 +
4. Acknowledgements ................................................8
 +
5. References ......................................................8
 +
  5.1. Normative Reference ........................................8
 +
  5.2. Informative References .....................................8
 +
Appendix A.  Example Algorithms ...................................11
 +
  A.1.  Threshold-Metering and -Marking ...........................11
 +
  A.2.  Excess-Traffic-Metering and -Marking ......................12
 +
Appendix B.  Implementation Notes .................................13
 +
  B.1.  Competing-Non-PCN-Traffic .................................13
 +
  B.2.  Scope .....................................................14
 +
  B.3.  Behaviour Aggregate Classification ........................15
 +
  B.4.  Dropping ..................................................15
 +
  B.5.  Threshold-Metering ........................................17
 +
  B.6.  Excess-Traffic-Metering ...................................18
 +
  B.7.  Marking ...................................................19
  
 
== Introduction ==
 
== Introduction ==
Line 74: Line 95:
 
configured rates are exceeded.  These configured rates are below the
 
configured rates are exceeded.  These configured rates are below the
 
rate of the link, thus providing notification to boundary nodes about
 
rate of the link, thus providing notification to boundary nodes about
 
 
 
 
  
 
overloads before any congestion occurs (hence "Pre-Congestion
 
overloads before any congestion occurs (hence "Pre-Congestion
Line 125: Line 142:
 
o  PCN-mark: actually mark the PCN-packets, if the meter functions
 
o  PCN-mark: actually mark the PCN-packets, if the meter functions
 
   indicate to do so.
 
   indicate to do so.
 
 
 
 
 
 
  
 
                                     +---------+    Result
 
                                     +---------+    Result
Line 175: Line 186:
 
   Appendix B.1 for further discussion about competing-non-PCN-
 
   Appendix B.1 for further discussion about competing-non-PCN-
 
   traffic.
 
   traffic.
 
 
 
 
 
 
 
 
 
  
 
o  Metered-packet: a packet that is metered by the metering functions
 
o  Metered-packet: a packet that is metered by the metering functions
Line 195: Line 197:
 
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [[RFC2119|RFC 2119]] [RFC2119].
+
document are to be interpreted as described in RFC 2119 [RFC2119].
  
 
== Specified PCN-Metering and -Marking Behaviours ==
 
== Specified PCN-Metering and -Marking Behaviours ==
Line 218: Line 220:
 
=== Dropping Function ===
 
=== Dropping Function ===
  
'''Note:''' If the PCN-node's queue overflows, then naturally packets are
+
Note: If the PCN-node's queue overflows, then naturally packets are
 
dropped.  This section describes additional action.
 
dropped.  This section describes additional action.
  
Line 231: Line 233:
 
o  PCN-packets that arrive at the PCN-node already excess-traffic-
 
o  PCN-packets that arrive at the PCN-node already excess-traffic-
 
   marked SHOULD be preferentially dropped.
 
   marked SHOULD be preferentially dropped.
 
 
 
 
 
 
  
 
o  the PCN-node's excess-traffic-meter SHOULD NOT meter the PCN-
 
o  the PCN-node's excess-traffic-meter SHOULD NOT meter the PCN-
Line 286: Line 282:
 
rate (PCN-excess-rate), to a maximum value BS_etm.  Tokens are
 
rate (PCN-excess-rate), to a maximum value BS_etm.  Tokens are
 
removed equal to the size in bits of the metered-packet, to a minimum
 
removed equal to the size in bits of the metered-packet, to a minimum
 
 
 
 
  
 
F_etm = 0.  If the token bucket is empty (F_etm = 0), then the meter
 
F_etm = 0.  If the token bucket is empty (F_etm = 0), then the meter
Line 331: Line 323:
 
o  change a PCN-packet into a non-PCN-packet.
 
o  change a PCN-packet into a non-PCN-packet.
  
'''Note:''' Although competing-non-PCN-packets MAY be metered, they MUST
+
Note: Although competing-non-PCN-packets MAY be metered, they MUST
 
NOT be PCN-marked.
 
NOT be PCN-marked.
  
Line 339: Line 331:
 
truthful PCN-metering and PCN-marking.  If this isn't the case, then
 
truthful PCN-metering and PCN-marking.  If this isn't the case, then
 
there are numerous potential attacks.  For instance, a rogue PCN-
 
there are numerous potential attacks.  For instance, a rogue PCN-
 
 
 
 
  
 
interior-node could PCN-mark all packets so that no flows were
 
interior-node could PCN-mark all packets so that no flows were
Line 385: Line 373:
 
=== Normative Reference ===
 
=== Normative Reference ===
  
[RFC2119]      Bradner, S., "Key words for use in RFCs to Indicate               Requirement Levels", [[BCP14|BCP 14]], [[RFC2119|RFC 2119]], March 1997.
+
[RFC2119]      Bradner, S., "Key words for use in RFCs to Indicate
 +
              Requirement Levels", BCP 14, RFC 2119, March 1997.
 +
 
 
=== Informative References ===
 
=== Informative References ===
  
[Baker08]      Baker, F., Polk, J., and M. Dolly, "DSCP for Capacity-               Admitted Traffic", Work in Progress, November 2008.
+
[Baker08]      Baker, F., Polk, J., and M. Dolly, "DSCP for Capacity-
 +
              Admitted Traffic", Work in Progress, November 2008.
  
 +
[Briscoe06-1]  Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,
 +
              F., Charny, A., Babiarz, J., Chan, K., Dudley, S.,
 +
              Karagiannis, G., Bader, A., and L. Westberg, "An edge-
 +
              to-edge Deployment Model for Pre-Congestion
 +
              Notification: Admission Control over a DiffServ
 +
              Region", Work in Progress, October 2006.
  
 +
[Briscoe06-2]  Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,
 +
              F., Charny, A., Liatsos, V., Babiarz, J., Chan, K.,
 +
              Dudley, S., Karagiannis, G., Bader, A., and L.
 +
              Westberg, "Pre-Congestion Notification marking", Work
 +
              in Progress, October 2006.
  
 +
[Briscoe08]    Briscoe, B., "Byte and Packet Congestion
 +
              Notification", Work in Progress, August 2008.
  
[Briscoe06-1]  Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,              F., Charny, A., Babiarz, J., Chan, K., Dudley, S.,              Karagiannis, G., Bader, A., and L. Westberg, "An edge-              to-edge Deployment Model for Pre-Congestion              Notification: Admission Control over a DiffServ              Region", Work in Progress, October 2006.
+
[Charny07]    Charny, A., Babiarz, J., Menth, M., and X. Zhang,
[Briscoe06-2]  Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,              F., Charny, A., Liatsos, V., Babiarz, J., Chan, K.,              Dudley, S., Karagiannis, G., Bader, A., and L.              Westberg, "Pre-Congestion Notification marking", Work              in Progress, October 2006.
+
              "Comparison of Proposed PCN Approaches", Work
[Briscoe08]    Briscoe, B., "Byte and Packet Congestion              Notification", Work in Progress, August 2008.
+
              in Progress, November 2007.
[Charny07]    Charny, A., Babiarz, J., Menth, M., and X. Zhang,               "Comparison of Proposed PCN Approaches", Work               in Progress, November 2007.
 
[Menth10]      Menth, M., Lehrieder, F., Briscoe, B., Eardley, P.,              Moncaster, T., Babiarz, J., Chan, K., Charny, A.,              Karagiannis, G., Zhang, X., Taylor, T., Satoh, D., and              R. Geib, "A Survey of PCN-Based Admission Control and              Flow Termination", IEEE Communications Surveys and              Tutorials, 2010 (third issue), <http://              www3.informatik.uni-wuerzburg.de/staff/menth/              Publications/papers/Menth08-PCN-Overview.pdf>.
 
[RFC2474]      Nichols, K., Blake, S., Baker, F., and D. Black,              "Definition of the Differentiated Services Field (DS              Field) in the IPv4 and IPv6 Headers", [[RFC2474|RFC 2474]],              December 1998.
 
[RFC2475]      Blake, S., Black, D., Carlson, M., Davies, E., Wang,              Z., and W. Weiss, "An Architecture for Differentiated              Services", [[RFC2475|RFC 2475]], December 1998.
 
[RFC3168]      Ramakrishnan, K., Floyd, S., and D. Black, "The              Addition of Explicit Congestion Notification (ECN) to              IP", [[RFC3168|RFC 3168]], September 2001.
 
[RFC4778]      Kaeo, M., "Operational Security Current Practices in              Internet Service Provider Environments", [[RFC4778|RFC 4778]],              January 2007.
 
[RFC5127]      Chan, K., Babiarz, J., and F. Baker, "Aggregation of              DiffServ Service Classes", [[RFC5127|RFC 5127]], February 2008.
 
  
 +
[Menth10]      Menth, M., Lehrieder, F., Briscoe, B., Eardley, P.,
 +
              Moncaster, T., Babiarz, J., Chan, K., Charny, A.,
 +
              Karagiannis, G., Zhang, X., Taylor, T., Satoh, D., and
 +
              R. Geib, "A Survey of PCN-Based Admission Control and
 +
              Flow Termination", IEEE Communications Surveys and
 +
              Tutorials, 2010 (third issue), <http://
 +
              www3.informatik.uni-wuerzburg.de/staff/menth/
 +
              Publications/papers/Menth08-PCN-Overview.pdf>.
  
 +
[RFC2474]      Nichols, K., Blake, S., Baker, F., and D. Black,
 +
              "Definition of the Differentiated Services Field (DS
 +
              Field) in the IPv4 and IPv6 Headers", RFC 2474,
 +
              December 1998.
  
 +
[RFC2475]      Blake, S., Black, D., Carlson, M., Davies, E., Wang,
 +
              Z., and W. Weiss, "An Architecture for Differentiated
 +
              Services", RFC 2475, December 1998.
  
[RFC5559]      Eardley, P., "Pre-Congestion Notification (PCN)              Architecture", [[RFC5559|RFC 5559]], June 2009.
+
[RFC3168]      Ramakrishnan, K., Floyd, S., and D. Black, "The
[RFC5696]      Moncaster, T., Briscoe, B., and M. Menth, "Baseline              Encoding and Transport of Pre-Congestion Information",              [[RFC5696|RFC 5696]], November 2009.
+
              Addition of Explicit Congestion Notification (ECN) to
[Taylor09]    Charny, A., Huang, F., Menth, M., and T. Taylor, "PCN              Boundary Node Behaviour for the Controlled Load (CL)               Mode of Operation", Work in Progress, March 2009.
+
              IP", RFC 3168, September 2001.
  
 +
[RFC4778]      Kaeo, M., "Operational Security Current Practices in
 +
              Internet Service Provider Environments", RFC 4778,
 +
              January 2007.
  
 +
[RFC5127]      Chan, K., Babiarz, J., and F. Baker, "Aggregation of
 +
              DiffServ Service Classes", RFC 5127, February 2008.
  
 +
[RFC5559]      Eardley, P., "Pre-Congestion Notification (PCN)
 +
              Architecture", RFC 5559, June 2009.
  
 +
[RFC5696]      Moncaster, T., Briscoe, B., and M. Menth, "Baseline
 +
              Encoding and Transport of Pre-Congestion Information",
 +
              RFC 5696, November 2009.
  
 +
[Taylor09]    Charny, A., Huang, F., Menth, M., and T. Taylor, "PCN
 +
              Boundary Node Behaviour for the Controlled Load (CL)
 +
              Mode of Operation", Work in Progress, March 2009.
  
 +
Appendix A.  Example Algorithms
  
 +
Note: This Appendix is informative, not normative.  It is an example
 +
of algorithms that implement Section 2 and is based on [Charny07] and
 +
[Menth10].
  
 +
There is no attempt to optimise the algorithms.  The metering and
 +
marking functions are implemented together.  It is assumed that three
 +
encoding states are available (one for threshold-marked, one for
 +
excess-traffic-marked, and one for not-marked).  It is assumed that
 +
all metered-packets are PCN-packets and that the link is never
 +
overloaded.  For excess-traffic-marking, "packet size independent
 +
marking" applies.
  
 +
A.1.  Threshold-Metering and -Marking
  
 +
A token bucket with the following parameters:
  
 +
  *  PCN-threshold-rate: token rate of token bucket (bits/second)
  
 +
  *  BS_tm: depth of token bucket (bits)
  
 +
  *  threshold: marking threshold of token bucket (bits)
  
 +
  *  lastUpdate: time the token bucket was last updated (seconds)
  
 +
  *  F_tm: amount of tokens in token bucket (bits)
  
 +
A PCN-packet has the following parameters:
  
 +
  *  packet_size: the size of the PCN-packet (bits)
  
 +
  *  packet_mark: the PCN encoding state of the packet
  
 +
In addition there is the parameter:
  
 +
      now: the current time (seconds)
  
 +
The following steps are performed when a PCN-packet arrives on a
 +
link:
  
 +
  *  F_tm = min(BS_tm, F_tm + (now - lastUpdate) * PCN-threshold-
 +
      rate); // add tokens to token bucket
  
 +
  *  F_tm = max(0, F_tm - packet_size); // remove tokens from token
 +
      bucket
  
 +
  *  if ((F_tm < threshold) AND (packet_mark != excess-traffic-
 +
      marked)) then packet_mark = threshold-marked; // do threshold-
 +
      marking, but don't re-mark packets that are already excess-
 +
      traffic-marked
  
 +
  *  lastUpdate = now // Note: 'now' has the same value as in step 1
  
 +
A.2.  Excess-Traffic-Metering and -Marking
  
 +
A token bucket with the following parameters:
  
 +
  *  PCN-excess-rate: token rate of token bucket (bits/second)
  
 +
  *  BS_etm: depth of TB in token bucket (bits)
  
 +
  *  lastUpdate: time the token bucket was last updated (seconds)
  
 +
  *  F_etm: amount of tokens in token bucket (bits)
  
 +
A PCN-packet has the following parameters:
  
 +
  *  packet_size: the size of the PCN-packet (bits)
  
 +
  *  packet_mark: the PCN encoding state of the packet
  
 +
In addition there is the parameter:
  
 +
  *  now: the current time (seconds)
  
 +
The following steps are performed when a PCN-packet arrives on a
 +
link:
  
 +
  *  F_etm = min(BS_etm, F_etm + (now - lastUpdate) * PCN-excess-
 +
      rate); // add tokens to token bucket
  
 +
  *  if (packet_mark != excess-traffic-marked) then // do not meter
 +
      packets that are already excess-traffic-marked
  
 +
      +  if (F_etm < 0) then packet_mark = excess-traffic-marked; //
 +
        do excess-traffic-marking.  The algorithm ensures this is
 +
        independent of packet size
  
 +
      +  else F_etm = F_etm - packet_size; // remove tokens from
 +
        token bucket if don't mark packet
  
Appendix A.  Example Algorithms
 
'''Note:''' This Appendix is informative, not normative.  It is an exampleof algorithms that implement Section 2 and is based on [Charny07] and[Menth10].
 
There is no attempt to optimise the algorithms.  The metering andmarking functions are implemented together.  It is assumed that threeencoding states are available (one for threshold-marked, one forexcess-traffic-marked, and one for not-marked).  It is assumed thatall metered-packets are PCN-packets and that the link is neveroverloaded.  For excess-traffic-marking, "packet size independentmarking" applies.
 
A.1.  Threshold-Metering and -Marking
 
A token bucket with the following parameters:
 
  *  PCN-threshold-rate: token rate of token bucket (bits/second)
 
  *  BS_tm: depth of token bucket (bits)
 
  *  threshold: marking threshold of token bucket (bits)
 
  *  lastUpdate: time the token bucket was last updated (seconds)
 
  *  F_tm: amount of tokens in token bucket (bits)
 
A PCN-packet has the following parameters:
 
  *  packet_size: the size of the PCN-packet (bits)
 
  *  packet_mark: the PCN encoding state of the packet
 
In addition there is the parameter:
 
      now: the current time (seconds)
 
The following steps are performed when a PCN-packet arrives on alink:
 
  *  F_tm = min(BS_tm, F_tm + (now - lastUpdate) * PCN-threshold-      rate); // add tokens to token bucket
 
  *  F_tm = max(0, F_tm - packet_size); // remove tokens from token      bucket
 
 
 
 
 
 
 
  *  if ((F_tm < threshold) AND (packet_mark != excess-traffic-      marked)) then packet_mark = threshold-marked; // do threshold-      marking, but don't re-mark packets that are already excess-      traffic-marked
 
  *  lastUpdate = now // Note: 'now' has the same value as in step 1
 
A.2.  Excess-Traffic-Metering and -Marking
 
A token bucket with the following parameters:
 
  *  PCN-excess-rate: token rate of token bucket (bits/second)
 
  *  BS_etm: depth of TB in token bucket (bits)
 
  *  lastUpdate: time the token bucket was last updated (seconds)
 
  *  F_etm: amount of tokens in token bucket (bits)
 
A PCN-packet has the following parameters:
 
  *  packet_size: the size of the PCN-packet (bits)
 
  *  packet_mark: the PCN encoding state of the packet
 
In addition there is the parameter:
 
  *  now: the current time (seconds)
 
The following steps are performed when a PCN-packet arrives on alink:
 
  *  F_etm = min(BS_etm, F_etm + (now - lastUpdate) * PCN-excess-      rate); // add tokens to token bucket
 
  *  if (packet_mark != excess-traffic-marked) then // do not meter      packets that are already excess-traffic-marked
 
      +  if (F_etm < 0) then packet_mark = excess-traffic-marked; //        do excess-traffic-marking.  The algorithm ensures this is        independent of packet size
 
      +  else F_etm = F_etm - packet_size; // remove tokens from        token bucket if don't mark packet
 
 
   *  lastUpdate = now // Note: 'now' has the same value as in step 1
 
   *  lastUpdate = now // Note: 'now' has the same value as in step 1
  
 +
Appendix B.  Implementation Notes
  
 +
Note: This Appendix is informative, not normative.  It comments on
 +
Section 2, including reasoning about whether MUSTs or SHOULDs are
 +
required.  For guidance on Operations and Management considerations,
 +
please see [RFC5559].
  
 +
B.1.  Competing-Non-PCN-Traffic
  
 +
In general, it is not advised to have any competing-non-PCN-traffic,
 +
essentially because the unpredictable amount of competing-non-PCN-
 +
traffic makes the PCN mechanisms less accurate and so reduces PCN's
 +
ability to protect the QoS of admitted PCN-flows [RFC5559].  But if
 +
there is competing-non-PCN-traffic, then:
  
 
Appendix B.  Implementation Notes
 
'''Note:''' This Appendix is informative, not normative.  It comments onSection 2, including reasoning about whether MUSTs or SHOULDs arerequired.  For guidance on Operations and Management considerations,please see [RFC5559].
 
B.1.  Competing-Non-PCN-Traffic
 
In general, it is not advised to have any competing-non-PCN-traffic,essentially because the unpredictable amount of competing-non-PCN-traffic makes the PCN mechanisms less accurate and so reduces PCN'sability to protect the QoS of admitted PCN-flows [RFC5559].  But ifthere is competing-non-PCN-traffic, then:
 
 
1.  There should be a mechanism to limit it, for example:
 
1.  There should be a mechanism to limit it, for example:
    *  limit the rate at which competing-non-PCN-traffic can be      forwarded on each link in the PCN-domain.  One method for      achieving this is to queue competing-non-PCN-packets      separately from PCN-packets and to limit the scheduling rate      of the former.  Another method is to drop competing-non-PCN-      packets in excess of some rate.
 
    *  police competing-non-PCN-traffic at the PCN-ingress-nodes, as      in the Diffserv architecture, for example.  However,      Diffserv's static traffic conditioning agreements risk a      focused overload of traffic from several PCN-ingress-nodes      onto one link.
 
    *  by design, it is known that the level of competing-non-PCN-      traffic is always very small -- perhaps it consists of      operator control messages only.
 
2.  In general, PCN's mechanisms should take account of competing-    non-PCN-traffic, in order to improve the accuracy of the decision    about whether to admit (or terminate) a PCN-flow.  For example:
 
    *  competing-non-PCN-traffic contributes to the PCN-meters;      competing-non-PCN-packets are treated as metered-packets.
 
    *  each PCN-node, on its links: (1) reduces the reference rates      (PCN-threshold-rate and PCN-excess-rate), in order to allow      'headroom' for the competing-non-PCN-traffic; (2) limits the      maximum forwarding rate of competing-non-PCN-traffic to be      less than the 'headroom'.  In this case, competing-non-PCN-      packets are not treated as metered-packets.
 
  
 +
    *  limit the rate at which competing-non-PCN-traffic can be
 +
      forwarded on each link in the PCN-domain.  One method for
 +
      achieving this is to queue competing-non-PCN-packets
 +
      separately from PCN-packets and to limit the scheduling rate
 +
      of the former.  Another method is to drop competing-non-PCN-
 +
      packets in excess of some rate.
  
 +
    *  police competing-non-PCN-traffic at the PCN-ingress-nodes, as
 +
      in the Diffserv architecture, for example.  However,
 +
      Diffserv's static traffic conditioning agreements risk a
 +
      focused overload of traffic from several PCN-ingress-nodes
 +
      onto one link.
  
 +
    *  by design, it is known that the level of competing-non-PCN-
 +
      traffic is always very small -- perhaps it consists of
 +
      operator control messages only.
  
 +
2.  In general, PCN's mechanisms should take account of competing-
 +
    non-PCN-traffic, in order to improve the accuracy of the decision
 +
    about whether to admit (or terminate) a PCN-flow.  For example:
  
3.  The operator should decide on appropriate action.  Dropping is    discussed further in Appendix B.4.
+
    * competing-non-PCN-traffic contributes to the PCN-meters;
One specific example of competing-non-PCN-traffic occurs if the PCN-compatible Diffserv codepoint is one of those that [Baker08] definesas suitable for use with admission control and there is such non-PCN-traffic in the PCN-domain. A similar example could occur forDiffserv codepoints of the Real-Time Treatment Aggregate [RFC5127].In such cases, PCN-traffic and competing-non-PCN-traffic aredistinguished by different values of the ECN field [RFC5696].
+
      competing-non-PCN-packets are treated as metered-packets.
Another example would occur if there is more than one PCN-compatibleDiffserv codepoint in a PCN-domain.  For instance, suppose there aretwo PCN-BAs treated at different priorities.  Then as far as thelower priority PCN-BA is concerned, the higher priority PCN-trafficneeds to be treated as competing-non-PCN-traffic.
 
B.2.  Scope
 
It may be known, for instance by the design of the network topology,that some links can never be pre-congested (even in unusualcircumstances, such as after the failure of some links).  There isthen no need to deploy the PCN-metering and -marking behaviour onthose links.
 
The meters can be implemented on the ingoing or outgoing interface ofa PCN-node.  It may be that existing hardware can support only onemeter per ingoing interface and one per outgoing interface.  Then,for instance, threshold-metering could be run on all the ingoinginterfaces and excess-traffic-metering on all the outgoinginterfaces; note that the same choice must be made for all the linksin a PCN-domain to ensure that the two metering behaviours areapplied exactly once for all the links.
 
The baseline encoding [RFC5696] specifies only two encoding states(PCN-marked and not-marked).  In this case, "excess-traffic-marked"means a packet that is PCN-marked as a result of the excess-traffic-meter function, and "threshold-marked" means a packet that is PCN-marked as a result of the threshold-meter function. As far asterminology is concerned, this interpretation is consistent with thatdefined in [RFC5559].  Note that a deployment needs to make aconsistent choice throughout the PCN-domain whether PCN-marked isinterpreted as excess-traffic-marked or threshold-marked.
 
Note that even if there are only two encoding states, it is stillrequired that both the meters are implemented, in order to easecompatibility between equipment and to remove a configuration optionand associated complexity.  Hardware with limited availability of
 
  
 +
    *  each PCN-node, on its links: (1) reduces the reference rates
 +
      (PCN-threshold-rate and PCN-excess-rate), in order to allow
 +
      'headroom' for the competing-non-PCN-traffic; (2) limits the
 +
      maximum forwarding rate of competing-non-PCN-traffic to be
 +
      less than the 'headroom'.  In this case, competing-non-PCN-
 +
      packets are not treated as metered-packets.
  
 +
3.  The operator should decide on appropriate action.  Dropping is
 +
    discussed further in Appendix B.4.
  
 +
One specific example of competing-non-PCN-traffic occurs if the PCN-
 +
compatible Diffserv codepoint is one of those that [Baker08] defines
 +
as suitable for use with admission control and there is such non-PCN-
 +
traffic in the PCN-domain.  A similar example could occur for
 +
Diffserv codepoints of the Real-Time Treatment Aggregate [RFC5127].
 +
In such cases, PCN-traffic and competing-non-PCN-traffic are
 +
distinguished by different values of the ECN field [RFC5696].
  
token buckets could be configured to run only one of the meters, butit must be possible to enable either meter.  Although, in thescenario with two encoding states, indications from one of the metersare ignored by the marking function, they may be logged or acted uponin some other way, for example, by the management system or anexplicit signalling protocol; such considerations are out of thescope of this document.
+
Another example would occur if there is more than one PCN-compatible
B.3.  Behaviour Aggregate Classification
+
Diffserv codepoint in a PCN-domain.  For instance, suppose there are
Configuration of PCN-nodes will define what values of the DSCP andECN fields indicate a PCN-packet in a particular PCN-domain.  Forinstance, [RFC5696] defines the baseline encoding.
+
two PCN-BAs treated at different prioritiesThen as far as the
Configuration will also define what values of the DSCP and ECN fieldsindicate a competing-non-PCN-packet in a particular PCN-domain.
+
lower priority PCN-BA is concerned, the higher priority PCN-traffic
B.4.  Dropping
+
needs to be treated as competing-non-PCN-traffic.
The objective of the dropping function is to minimise the queueingdelay suffered by metered-traffic at a PCN-node, since PCN-traffic(and perhaps competing-non-PCN-traffic) is expected to be inelastictraffic generated by real-time applicationsIn practice, it wouldbe defined as exceeding a specific traffic profile, typically basedon a token bucket.
 
If there is no competing-non-PCN-traffic, then it is not expectedthat the dropping function is needed, since PCN's flow admission andtermination mechanisms limit the amount of PCN-traffic.  Even so, itstill might be implemented as a back stop against misconfiguration ofthe PCN-domain, for instance.
 
If there is competing-non-PCN-traffic, then the details of thedropping function will depend on how the router's implementationhandles the two sorts of traffic:
 
1.  a common queue for PCN-traffic and competing-non-PCN-traffic,   with a traffic conditioner for the competing-non-PCN-traffic; or
 
2.  separate queues, in which case the amount of competing-non-PCN-    traffic can be limited by limiting the rate at which the    scheduler (for the competing-non-PCN-traffic) forwards packets.
 
(The discussion here is based on that in [Baker08].)
 
  
 +
B.2.  Scope
  
 +
It may be known, for instance by the design of the network topology,
 +
that some links can never be pre-congested (even in unusual
 +
circumstances, such as after the failure of some links).  There is
 +
then no need to deploy the PCN-metering and -marking behaviour on
 +
those links.
  
 +
The meters can be implemented on the ingoing or outgoing interface of
 +
a PCN-node.  It may be that existing hardware can support only one
 +
meter per ingoing interface and one per outgoing interface.  Then,
 +
for instance, threshold-metering could be run on all the ingoing
 +
interfaces and excess-traffic-metering on all the outgoing
 +
interfaces; note that the same choice must be made for all the links
 +
in a PCN-domain to ensure that the two metering behaviours are
 +
applied exactly once for all the links.
  
 +
The baseline encoding [RFC5696] specifies only two encoding states
 +
(PCN-marked and not-marked).  In this case, "excess-traffic-marked"
 +
means a packet that is PCN-marked as a result of the excess-traffic-
 +
meter function, and "threshold-marked" means a packet that is PCN-
 +
marked as a result of the threshold-meter function.  As far as
 +
terminology is concerned, this interpretation is consistent with that
 +
defined in [RFC5559].  Note that a deployment needs to make a
 +
consistent choice throughout the PCN-domain whether PCN-marked is
 +
interpreted as excess-traffic-marked or threshold-marked.
  
 +
Note that even if there are only two encoding states, it is still
 +
required that both the meters are implemented, in order to ease
 +
compatibility between equipment and to remove a configuration option
 +
and associated complexity.  Hardware with limited availability of
  
 +
token buckets could be configured to run only one of the meters, but
 +
it must be possible to enable either meter.  Although, in the
 +
scenario with two encoding states, indications from one of the meters
 +
are ignored by the marking function, they may be logged or acted upon
 +
in some other way, for example, by the management system or an
 +
explicit signalling protocol; such considerations are out of the
 +
scope of this document.
  
 +
B.3.  Behaviour Aggregate Classification
  
Note that only dropping of packets is allowed.  Downgrading ofpackets to a lower priority BA is not allowed (see Appendix B.7),since it would lead to packet mis-ordering.  Shaping ("the process ofdelaying packets" [RFC2475]) is not suitable if the traffic comesfrom real-time applications.
+
Configuration of PCN-nodes will define what values of the DSCP and
Preferential dropping of competing-non-PCN-traffic:  In general, it is reasonable for competing-non-PCN-traffic to get  harsher treatment than PCN-traffic (that is, competing-non-PCN-  packets are preferentially dropped) because PCN's flow admission  and termination mechanisms are stronger than the mechanisms that  are likely to be applied to the competing-non-PCN-traffic.  The  PCN mechanisms also mean that a dropper should not be needed for  the PCN-traffic.
+
ECN fields indicate a PCN-packet in a particular PCN-domain.  For
Preferential dropping of excess-traffic-marked packets:  Section 2.2 specifies, "If the PCN-node drops PCN-packets, then  ...  PCN-packets that arrive at the PCN-node already excess-  traffic-marked SHOULD be preferentially dropped".  In brief, the  reason is that, with the "controlled load" edge behaviour  [Taylor09], this avoids over-termination in the event of multiple  bottlenecks in the PCN-domain [Charny07].  A fuller explanation is  as follows.  The optimal dropping behaviour depends on the  particular edge behaviour [Menth10].  A single dropping behaviour  is defined, as it is simpler to standardise, implement, and  operate.  The standardised dropping behaviour is at least adequate  for all edge behaviours (and good for some), whereas others are  not (for example, with tail dropping, far too much traffic may be  terminated with the "controlled load" edge behaviour, in the event  of multiple bottlenecks in the PCN-domain [Charny07]).  The  dropping behaviour is defined as a 'SHOULD', rather than a 'MUST',  in recognition that other dropping behaviour may be preferred in  particular circumstances, for example: (1) with the "marked flow"  termination edge behaviour, preferential dropping of unmarked  packets may be better [Menth10]; (2) tail dropping may make PCN-  marking behaviour easier to implement on current routers.
+
instance, [RFC5696] defines the baseline encoding.
Exactly what "preferentially dropped" means is left to theimplementationIt is also left to the implementation what to do ifthere are no excess-traffic-marked PCN-packets available at aparticular instant.
 
Section 2.2 also specifies, "the PCN-node's excess-traffic-meterSHOULD NOT meter the PCN-packets that it drops."  This avoids over-termination [Menth10].  Effectively, it means that the droppingfunction (if present) should be done before the meter functions --which is natural.
 
  
 +
Configuration will also define what values of the DSCP and ECN fields
 +
indicate a competing-non-PCN-packet in a particular PCN-domain.
  
 +
B.4.  Dropping
  
 +
The objective of the dropping function is to minimise the queueing
 +
delay suffered by metered-traffic at a PCN-node, since PCN-traffic
 +
(and perhaps competing-non-PCN-traffic) is expected to be inelastic
 +
traffic generated by real-time applications.  In practice, it would
 +
be defined as exceeding a specific traffic profile, typically based
 +
on a token bucket.
  
 +
If there is no competing-non-PCN-traffic, then it is not expected
 +
that the dropping function is needed, since PCN's flow admission and
 +
termination mechanisms limit the amount of PCN-traffic.  Even so, it
 +
still might be implemented as a back stop against misconfiguration of
 +
the PCN-domain, for instance.
  
B.5.  Threshold-Metering
+
If there is competing-non-PCN-traffic, then the details of the
The description is in terms of a 'token bucket with threshold' (which[Briscoe06-1] views as a virtual queue).  However, the description isnot intended to standardise implementation.
+
dropping function will depend on how the router's implementation
The reference rate of the threshold-meter (PCN-threshold-rate) isconfigured at less than the rate allocated to the PCN-traffic class.Also, the PCN-threshold-rate is less than, or possibly equal to, thePCN-excess-rate.
+
handles the two sorts of traffic:
Section 2.3 specifies, "If F_tm < threshold, then the meter indicatesto the marking function that the packet is to be threshold-marked;otherwise, it does not."  Note that a PCN-packet is marked withoutexplicit additional bias for the packet's size.
 
The behaviour must be functionally equivalent to the description inSection 2.3.  "Functionally equivalent" means the observable 'blackbox' behaviour is the same or very similar, for example, if eitherprecisely the same set of packets is marked or if the set is shiftedby one packet.  It is intended to allow implementation freedom overmatters such as:
 
o  whether tokens are added to the token bucket at regular time  intervals or only when a packet is processed.
 
o  whether the new token bucket depth is calculated before or after  it is decided whether to PCN-mark the packet.  The effect of this  is simply to shift the sequence of marks by one packet.
 
o  when the token bucket is very nearly empty and a packet arrives  larger than F_tm, then the precise change in F_tm is up to the  implementation.  For instance:
 
  *  set F_tm = 0 and indicate threshold-mark to the marking      function.
 
  *  check whether F_tm < threshold and if it is, then indicate      threshold-mark to the marking function; then set F_tm = 0.
 
  *  leave F_tm unaltered and indicate threshold-mark to the marking      function.
 
o  similarly, when the token bucket is very nearly full and a packet  arrives larger than (BS_tm - F_tm), then the precise change in  F_tm is up to the implementation.
 
  
 +
1.  a common queue for PCN-traffic and competing-non-PCN-traffic,
 +
    with a traffic conditioner for the competing-non-PCN-traffic; or
  
 +
2.  separate queues, in which case the amount of competing-non-PCN-
 +
    traffic can be limited by limiting the rate at which the
 +
    scheduler (for the competing-non-PCN-traffic) forwards packets.
  
 +
(The discussion here is based on that in [Baker08].)
  
 +
Note that only dropping of packets is allowed.  Downgrading of
 +
packets to a lower priority BA is not allowed (see Appendix B.7),
 +
since it would lead to packet mis-ordering.  Shaping ("the process of
 +
delaying packets" [RFC2475]) is not suitable if the traffic comes
 +
from real-time applications.
  
 +
Preferential dropping of competing-non-PCN-traffic:
 +
  In general, it is reasonable for competing-non-PCN-traffic to get
 +
  harsher treatment than PCN-traffic (that is, competing-non-PCN-
 +
  packets are preferentially dropped) because PCN's flow admission
 +
  and termination mechanisms are stronger than the mechanisms that
 +
  are likely to be applied to the competing-non-PCN-traffic.  The
 +
  PCN mechanisms also mean that a dropper should not be needed for
 +
  the PCN-traffic.
  
Note that all PCN-packets, even if already marked, are metered by thethreshold-meter function (unlike the excess-traffic-meter function),because all packets should contribute to the decision whether thereis room for a new flow.
+
Preferential dropping of excess-traffic-marked packets:
B.6Excess-Traffic-Metering
+
  Section 2.2 specifies, "If the PCN-node drops PCN-packets, then
The description is in terms of a token bucket, however theimplementation is not standardised.
+
  ...  PCN-packets that arrive at the PCN-node already excess-
The reference rate of the excess-traffic-meter (PCN-excess-rate) isconfigured at less than (or possibly equal to) the rate allocated tothe PCN-traffic classAlso, the PCN-excess-rate is greater than, orpossibly equal to, the PCN-threshold-rate.
+
  traffic-marked SHOULD be preferentially dropped"In brief, the
As in Section B.5, "functionally equivalent" allows someimplementation flexibility, for example, the exact algorithm when thetoken bucket is very nearly empty or very nearly full.
+
  reason is that, with the "controlled load" edge behaviour
Section 2.4 specifies, "A packet SHOULD NOT be metered (by thisexcess-traffic-meter function) ... if the packet is already excess-traffic-marked on arrival at the PCN-node".  This avoids over-termination (with some edge behaviours) in the event that the PCN-traffic passes through multiple bottlenecks in the PCN-domain[Charny07].  Note that an implementation could determine whether thepacket is already excess-traffic-marked as an integral part of its BAclassification function.  The behaviour is defined as a 'SHOULD NOT',rather than a 'MUST NOT', because it may be slightly harder toimplement than a metering function that is blind to previous packetmarkings.
+
  [Taylor09], this avoids over-termination in the event of multiple
Section 2.4 specifies, "A packet SHOULD NOT be metered (by thisexcess-traffic-meter function) ... if this PCN-node drops thepacket."  This avoids over-termination [Menth10].  (A similarstatement could also be made for the threshold-meter function but isirrelevant, as a link that is overloaded will already besubstantially pre-congested and hence threshold-marking all packets.)It seems natural to perform the dropping function before the meteringfunctions, although for some equipment it may be harder to implement;hence, the behaviour is defined as a 'SHOULD NOT', rather than a'MUST NOT'.
+
  bottlenecks in the PCN-domain [Charny07].  A fuller explanation is
"Packet size independent marking" -- excess-traffic-marking that isindependent of packet size -- is specified as a 'SHOULD' rather thana 'MUST' in Section 2.4 because it may be slightly harder for someequipment to implement, and the impact of not doing so is undesirablebut moderate (sufficient traffic is terminated, but flows with largepackets are more likely to be terminated). With the "classic"
+
  as follows.  The optimal dropping behaviour depends on the
 +
  particular edge behaviour [Menth10].  A single dropping behaviour
 +
  is defined, as it is simpler to standardise, implement, and
 +
  operate. The standardised dropping behaviour is at least adequate
 +
  for all edge behaviours (and good for some), whereas others are
 +
  not (for example, with tail dropping, far too much traffic may be
 +
  terminated with the "controlled load" edge behaviour, in the event
 +
  of multiple bottlenecks in the PCN-domain [Charny07]).  The
 +
  dropping behaviour is defined as a 'SHOULD', rather than a 'MUST',
 +
  in recognition that other dropping behaviour may be preferred in
 +
  particular circumstances, for example: (1) with the "marked flow"
 +
  termination edge behaviour, preferential dropping of unmarked
 +
  packets may be better [Menth10]; (2) tail dropping may make PCN-
 +
  marking behaviour easier to implement on current routers.
  
 +
Exactly what "preferentially dropped" means is left to the
 +
implementation.  It is also left to the implementation what to do if
 +
there are no excess-traffic-marked PCN-packets available at a
 +
particular instant.
  
 +
Section 2.2 also specifies, "the PCN-node's excess-traffic-meter
 +
SHOULD NOT meter the PCN-packets that it drops."  This avoids over-
 +
termination [Menth10].  Effectively, it means that the dropping
 +
function (if present) should be done before the meter functions --
 +
which is natural.
  
 +
B.5.  Threshold-Metering
  
excess-traffic-meter behaviour, large packets are more likely to beexcess-traffic-marked than small packets (because packets are markedif the number of tokens in the token bucket is smaller than thepacket size).  This means that, with some edge behaviours, flows withlarge packets are more likely to be terminated than flows with smallpackets ([Briscoe08], [Menth10]).  "Packet size independent marking"can be achieved by a small modification of the "classic" excess-traffic-meter.  The number of tokens in the bucket can becomenegative; if this number is negative at a packet's arrival, thepacket is marked; otherwise, the amount of tokens equal to the packetsize is removed from the bucket.  Note that with "packet sizeindependent marking", either the packet is marked or tokens areremoved -- never both.  Hence, the token bucket cannot become morenegative than the maximum packet size on the link.  The algorithmdescribed in Appendix A implements this behaviour.
+
The description is in terms of a 'token bucket with threshold' (which
Note that BS_etm is independent of BS_tm, F_etm is independent ofF_tm (except in that a packet can change both), and the twoconfigured rates (PCN-excess-rate and PCN-threshold-rate) areindependent (except that PCN-excess-rate >= PCN-threshold-rate).
+
[Briscoe06-1] views as a virtual queue)However, the description is
B.7.  Marking
+
not intended to standardise implementation.
Section 2.5 defines, "A PCN-node MUST NOT ...change a PCN-packet intoa non-PCN-packet"This means that a PCN-node is not allowed todowngrade a PCN-packet into a lower priority Diffserv BA (hence,downgrading is not allowed as an alternative to dropping).
 
Section 2.5 defines, "A PCN-node MUST NOT ...PCN-mark a packet thatis not a PCN-packet".  This means that in the scenario wherecompeting-non-PCN-packets are treated as metered-packets, a meter mayindicate a packet is to be PCN-marked, but the marking function knowsit cannot be marked.  It is left open to the implementation exactlywhat to do in this case; one simple possibility is to mark the nextPCN-packet.  Note that unless the PCN-packets are a large fraction ofall the metered-packets, the PCN mechanisms may not work well.
 
Although the metering functions are described separately from themarking function, they can be implemented in an integrated fashion.
 
  
 +
The reference rate of the threshold-meter (PCN-threshold-rate) is
 +
configured at less than the rate allocated to the PCN-traffic class.
 +
Also, the PCN-threshold-rate is less than, or possibly equal to, the
 +
PCN-excess-rate.
  
 +
Section 2.3 specifies, "If F_tm < threshold, then the meter indicates
 +
to the marking function that the packet is to be threshold-marked;
 +
otherwise, it does not."  Note that a PCN-packet is marked without
 +
explicit additional bias for the packet's size.
  
 +
The behaviour must be functionally equivalent to the description in
 +
Section 2.3.  "Functionally equivalent" means the observable 'black
 +
box' behaviour is the same or very similar, for example, if either
 +
precisely the same set of packets is marked or if the set is shifted
 +
by one packet.  It is intended to allow implementation freedom over
 +
matters such as:
  
 +
o  whether tokens are added to the token bucket at regular time
 +
  intervals or only when a packet is processed.
  
 +
o  whether the new token bucket depth is calculated before or after
 +
  it is decided whether to PCN-mark the packet.  The effect of this
 +
  is simply to shift the sequence of marks by one packet.
  
 +
o  when the token bucket is very nearly empty and a packet arrives
 +
  larger than F_tm, then the precise change in F_tm is up to the
 +
  implementation.  For instance:
  
 +
  *  set F_tm = 0 and indicate threshold-mark to the marking
 +
      function.
  
 +
  *  check whether F_tm < threshold and if it is, then indicate
 +
      threshold-mark to the marking function; then set F_tm = 0.
  
 +
  *  leave F_tm unaltered and indicate threshold-mark to the marking
 +
      function.
  
 +
o  similarly, when the token bucket is very nearly full and a packet
 +
  arrives larger than (BS_tm - F_tm), then the precise change in
 +
  F_tm is up to the implementation.
  
 +
Note that all PCN-packets, even if already marked, are metered by the
 +
threshold-meter function (unlike the excess-traffic-meter function),
 +
because all packets should contribute to the decision whether there
 +
is room for a new flow.
  
 +
B.6.  Excess-Traffic-Metering
  
Author's Address
+
The description is in terms of a token bucket, however the
Philip Eardley (editor)BTAdastral Park, Martlesham HeathIpswich  IP5 3REUK
+
implementation is not standardised.
EMail: philip.eardley@bt.com
 
  
 +
The reference rate of the excess-traffic-meter (PCN-excess-rate) is
 +
configured at less than (or possibly equal to) the rate allocated to
 +
the PCN-traffic class.  Also, the PCN-excess-rate is greater than, or
 +
possibly equal to, the PCN-threshold-rate.
  
 +
As in Section B.5, "functionally equivalent" allows some
 +
implementation flexibility, for example, the exact algorithm when the
 +
token bucket is very nearly empty or very nearly full.
  
 +
Section 2.4 specifies, "A packet SHOULD NOT be metered (by this
 +
excess-traffic-meter function) ... if the packet is already excess-
 +
traffic-marked on arrival at the PCN-node".  This avoids over-
 +
termination (with some edge behaviours) in the event that the PCN-
 +
traffic passes through multiple bottlenecks in the PCN-domain
 +
[Charny07].  Note that an implementation could determine whether the
 +
packet is already excess-traffic-marked as an integral part of its BA
 +
classification function.  The behaviour is defined as a 'SHOULD NOT',
 +
rather than a 'MUST NOT', because it may be slightly harder to
 +
implement than a metering function that is blind to previous packet
 +
markings.
  
 +
Section 2.4 specifies, "A packet SHOULD NOT be metered (by this
 +
excess-traffic-meter function) ... if this PCN-node drops the
 +
packet."  This avoids over-termination [Menth10].  (A similar
 +
statement could also be made for the threshold-meter function but is
 +
irrelevant, as a link that is overloaded will already be
 +
substantially pre-congested and hence threshold-marking all packets.)
 +
It seems natural to perform the dropping function before the metering
 +
functions, although for some equipment it may be harder to implement;
 +
hence, the behaviour is defined as a 'SHOULD NOT', rather than a
 +
'MUST NOT'.
  
 +
"Packet size independent marking" -- excess-traffic-marking that is
 +
independent of packet size -- is specified as a 'SHOULD' rather than
 +
a 'MUST' in Section 2.4 because it may be slightly harder for some
 +
equipment to implement, and the impact of not doing so is undesirable
 +
but moderate (sufficient traffic is terminated, but flows with large
 +
packets are more likely to be terminated).  With the "classic"
  
 +
excess-traffic-meter behaviour, large packets are more likely to be
 +
excess-traffic-marked than small packets (because packets are marked
 +
if the number of tokens in the token bucket is smaller than the
 +
packet size).  This means that, with some edge behaviours, flows with
 +
large packets are more likely to be terminated than flows with small
 +
packets ([Briscoe08], [Menth10]).  "Packet size independent marking"
 +
can be achieved by a small modification of the "classic" excess-
 +
traffic-meter.  The number of tokens in the bucket can become
 +
negative; if this number is negative at a packet's arrival, the
 +
packet is marked; otherwise, the amount of tokens equal to the packet
 +
size is removed from the bucket.  Note that with "packet size
 +
independent marking", either the packet is marked or tokens are
 +
removed -- never both.  Hence, the token bucket cannot become more
 +
negative than the maximum packet size on the link.  The algorithm
 +
described in Appendix A implements this behaviour.
  
 +
Note that BS_etm is independent of BS_tm, F_etm is independent of
 +
F_tm (except in that a packet can change both), and the two
 +
configured rates (PCN-excess-rate and PCN-threshold-rate) are
 +
independent (except that PCN-excess-rate >= PCN-threshold-rate).
  
 +
B.7.  Marking
  
 +
Section 2.5 defines, "A PCN-node MUST NOT ...change a PCN-packet into
 +
a non-PCN-packet".  This means that a PCN-node is not allowed to
 +
downgrade a PCN-packet into a lower priority Diffserv BA (hence,
 +
downgrading is not allowed as an alternative to dropping).
  
 +
Section 2.5 defines, "A PCN-node MUST NOT ...PCN-mark a packet that
 +
is not a PCN-packet".  This means that in the scenario where
 +
competing-non-PCN-packets are treated as metered-packets, a meter may
 +
indicate a packet is to be PCN-marked, but the marking function knows
 +
it cannot be marked.  It is left open to the implementation exactly
 +
what to do in this case; one simple possibility is to mark the next
 +
PCN-packet.  Note that unless the PCN-packets are a large fraction of
 +
all the metered-packets, the PCN mechanisms may not work well.
  
 +
Although the metering functions are described separately from the
 +
marking function, they can be implemented in an integrated fashion.
  
 +
Author's Address
  
 +
Philip Eardley (editor)
 +
BT
 +
Adastral Park, Martlesham Heath
 +
Ipswich  IP5 3RE
 +
UK
  
 
+
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
[[Category:Standards Track]]
 

Revision as of 11:11, 27 September 2020

Network Working Group P. Eardley, Ed. Request for Comments: 5670 BT Category: Standards Track November 2009

          Metering and Marking Behaviour of PCN-Nodes

Abstract

The objective of Pre-Congestion Notification (PCN) is to protect the quality of service (QoS) of inelastic flows within a Diffserv domain in a simple, scalable, and robust fashion. This document defines the two metering and marking behaviours of PCN-nodes. Threshold-metering and -marking marks all PCN-packets if the rate of PCN-traffic is greater than a configured rate ("PCN-threshold-rate"). Excess- traffic-metering and -marking marks a proportion of PCN-packets, such that the amount marked equals the rate of PCN-traffic in excess of a configured rate ("PCN-excess-rate"). The level of marking allows PCN-boundary-nodes to make decisions about whether to admit or terminate PCN-flows.

Status of This Memo

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the BSD License.

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow

modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.

Table of Contents

1. Introduction ....................................................2

  1.1. Terminology ................................................4
       1.1.1. Requirements Language ...............................5

2. Specified PCN-Metering and -Marking Behaviours ..................5

  2.1. Behaviour Aggregate Classification Function ................5
  2.2. Dropping Function ..........................................5
  2.3. Threshold-Meter Function ...................................6
  2.4. Excess-Traffic-Meter Function ..............................6
  2.5. Marking Function ...........................................7

3. Security Considerations .........................................7 4. Acknowledgements ................................................8 5. References ......................................................8

  5.1. Normative Reference ........................................8
  5.2. Informative References .....................................8

Appendix A. Example Algorithms ...................................11

 A.1.  Threshold-Metering and -Marking ...........................11
 A.2.  Excess-Traffic-Metering and -Marking ......................12

Appendix B. Implementation Notes .................................13

 B.1.  Competing-Non-PCN-Traffic .................................13
 B.2.  Scope .....................................................14
 B.3.  Behaviour Aggregate Classification ........................15
 B.4.  Dropping ..................................................15
 B.5.  Threshold-Metering ........................................17
 B.6.  Excess-Traffic-Metering ...................................18
 B.7.  Marking ...................................................19

Introduction

The objective of Pre-Congestion Notification (PCN) is to protect the quality of service (QoS) of inelastic flows within a Diffserv domain in a simple, scalable, and robust fashion. Two mechanisms are used: admission control to decide whether to admit or block a new flow request, and (in abnormal circumstances) flow termination to decide whether to terminate some of the existing flows. To achieve this, the overall rate of PCN-traffic is metered on every link in the domain, and PCN-packets are appropriately marked when certain configured rates are exceeded. These configured rates are below the rate of the link, thus providing notification to boundary nodes about

overloads before any congestion occurs (hence "Pre-Congestion Notification"). The level of marking allows boundary nodes to make decisions about whether to admit or terminate. Within the domain, PCN-traffic is forwarded in a prioritised Diffserv traffic class [RFC2475].

This document defines the two metering and marking behaviours of PCN- nodes. Their aim is to enable PCN-nodes to give an "early warning" of potential congestion before there is any significant build-up of PCN-packets in their queues. In summary, their objectives are:

o Threshold-metering and -marking: to mark all PCN-packets (with a

  "threshold-mark") when the bit rate of PCN-traffic is greater than
  its configured reference rate ("PCN-threshold-rate").

o Excess-traffic-metering and -marking: when the bit rate of PCN-

  packets is greater than its configured reference rate ("PCN-
  excess-rate"), to mark PCN-packets (with an "excess-traffic-mark")
  at a rate equal to the difference between the rate of PCN-traffic
  and the PCN-excess-rate.

Note that although [RFC3168] defines a broadly RED-like (Random Early Detection) default congestion marking behaviour, it allows alternatives to be defined; this document defines such an alternative.

Section 2 below describes the functions involved, which in outline (see Figure 1) are:

o Behaviour aggregate (BA) classification: decide whether or not an

  incoming packet is a PCN-packet.

o Dropping (optional): drop packets if the link is overloaded.

o Threshold-meter: determine whether the bit rate of PCN-traffic

  exceeds its configured reference rate (PCN-threshold-rate).  The
  meter operates on all PCN-packets on the link, and not on
  individual flows.

o Excess-traffic-meter: measure by how much the bit rate of PCN-

  traffic exceeds its configured reference rate (PCN-excess-rate).
  The meter operates on all PCN-packets on the link, and not on
  individual flows.

o PCN-mark: actually mark the PCN-packets, if the meter functions

  indicate to do so.
                                    +---------+    Result
                                 +->|Threshold|-------+
                                 |  |  Meter  |       |
                                 |  +---------+       V
     +----------+   +- - - - -+  |                +------+
     |   BA     |   |         |  |                |      |    Marked

Packet =>|Classifier|==>| Dropper |==?===============>|Marker|==> Packet Stream | | | | | | | Stream

     +----------+   +- - - - -+  |                +------+
                                 |  +---------+       ^
                                 |  | Excess  |       |
                                 +->| Traffic |-------+
                                    |  Meter  |    Result
                                    +---------+
   Figure 1: Schematic of PCN-interior-node functionality

Appendix A gives an example of algorithms that fulfil the specification of Section 2, and Appendix B provides some explanations of and comments on Section 2. Both the Appendices are informative.

The general architecture for PCN is described in [RFC5559], whilst [Menth10] is an overview of PCN.

Terminology

In addition to the terminology defined in [RFC5559] and [RFC2474], the following terms are defined:

o Competing-non-PCN-packet: a non-PCN-packet that shares a link with

  PCN-packets and competes with them for its forwarding bandwidth.
  Competing-non-PCN-packets MUST NOT be PCN-marked (only PCN-packets
  can be PCN-marked).
  Note: In general, it is not advised to have any competing-non-PCN-
  traffic.
  Note: There is likely to be traffic (such as best effort) that is
  forwarded at lower priority than PCN-traffic; although it shares
  the link with PCN-traffic, it doesn't compete for forwarding
  bandwidth, and hence it is not competing-non-PCN-traffic.  See
  Appendix B.1 for further discussion about competing-non-PCN-
  traffic.

o Metered-packet: a packet that is metered by the metering functions

  specified in Sections 2.3 and 2.4.  A PCN-packet MUST be treated
  as a metered-packet (with the minor exception noted below in
  Section 2.4).  A competing-non-PCN-packet MAY be treated as a
  metered-packet.

Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

Specified PCN-Metering and -Marking Behaviours

This section defines the two PCN-metering and -marking behaviours. The descriptions are functional and are not intended to restrict the implementation. The informative Appendices supplement this section.

Behaviour Aggregate Classification Function

A PCN-node MUST classify a packet as a PCN-packet if the value of its Differentiated Services Code Point (DSCP) and Explicit Congestion Notification (ECN) fields correspond to a PCN-enabled codepoint, as defined in the encoding scheme applicable to the PCN-domain (for example, [RFC5696] defines the baseline encoding). Otherwise, the packet MUST NOT be classified as a PCN-packet.

A PCN-node MUST classify a packet as a competing-non-PCN-packet if it is not a PCN-packet and it competes with PCN-packets for its forwarding bandwidth on a link.

Dropping Function

Note: If the PCN-node's queue overflows, then naturally packets are dropped. This section describes additional action.

On all links in the PCN-domain, dropping MAY be done by first metering all metered-packets to determine if the rate of metered- traffic on the link is greater than the rate allowed for such traffic; if the rate of metered-traffic is too high, then drop metered-packets.

If the PCN-node drops PCN-packets, then:

o PCN-packets that arrive at the PCN-node already excess-traffic-

  marked SHOULD be preferentially dropped.

o the PCN-node's excess-traffic-meter SHOULD NOT meter the PCN-

  packets that it drops.

Threshold-Meter Function

A PCN-node MUST implement a threshold-meter that has behaviour functionally equivalent to the following.

The meter acts like a token bucket, which is sized in bits and has a configured reference rate (bits per second). The amount of tokens in the token bucket is termed F_tm. Tokens are added at the reference rate (PCN-threshold-rate), to a maximum value BS_tm. Tokens are removed equal to the size in bits of the metered-packet, to a minimum F_tm = 0. (Explanation of abbreviations: F is short for Fill of the token bucket, BS for bucket size, and tm for threshold-meter.)

The token bucket has a configured intermediate depth, termed threshold. If F_tm < threshold, then the meter indicates to the marking function that the packet is to be threshold-marked; otherwise, it does not.

Excess-Traffic-Meter Function

A packet SHOULD NOT be metered (by this excess-traffic-meter function) in the following two cases:

o if the PCN-packet is already excess-traffic-marked on arrival at

  the PCN-node.

o if this PCN-node drops the packet.

Otherwise, the PCN-packet MUST be treated as a metered-packet -- that is, it is metered by the excess-traffic-meter.

A PCN-node MUST implement an excess-traffic-meter. The excess- traffic-meter SHOULD indicate packets to be excess-traffic-marked, independent of their size ("packet size independent marking"); if "packet size independent marking" is not implemented, then the excess-traffic-meter MUST use the "classic" metering behaviour.

For the "classic" metering behaviour, the excess-traffic-meter has behaviour functionally equivalent to the following.

The meter acts like a token bucket, which is sized in bits and has a configured reference rate (bits per second). The amount of tokens in the token bucket is termed F_etm. Tokens are added at the reference rate (PCN-excess-rate), to a maximum value BS_etm. Tokens are removed equal to the size in bits of the metered-packet, to a minimum

F_etm = 0. If the token bucket is empty (F_etm = 0), then the meter indicates to the marking function that the packet is to be excess- traffic-marked. (Explanation of abbreviations: F is short for Fill of the token bucket, BS for bucket size, and etm for excess-traffic- meter.)

For "packet size independent marking", the excess-traffic-meter has behaviour functionally equivalent to the following.

The meter acts like a token bucket, which is sized in bits and has a configured reference rate (bits per second). The amount of tokens in the token bucket is termed F_etm. Tokens are added at the reference rate (PCN-excess-rate), to a maximum value BS_etm. If the token bucket is not negative, then tokens are removed equal to the size in bits of the metered-packet (and the meter does not indicate to the marking function that the packet is to be excess-traffic-marked). If the token bucket is negative (F_etm < 0), then the meter indicates to the marking function that the packet is to be excess-traffic-marked (and no tokens are removed). (Explanation of abbreviations: F is short for Fill of the token bucket, BS for bucket size, and etm for excess-traffic-meter.)

Otherwise, the meter MUST NOT indicate marking.

Marking Function

A PCN-packet MUST be marked to reflect the metering results by setting its encoding state appropriately, as specified by the specific encoding scheme that applies in the PCN-domain. A consistent choice of encoding scheme MUST be made throughout a PCN- domain.

A PCN-node MUST NOT:

o PCN-mark a packet that is not a PCN-packet;

o change a non-PCN-packet into a PCN-packet;

o change a PCN-packet into a non-PCN-packet.

Note: Although competing-non-PCN-packets MAY be metered, they MUST NOT be PCN-marked.

Security Considerations

It is assumed that all PCN-nodes are PCN-enabled and are trusted for truthful PCN-metering and PCN-marking. If this isn't the case, then there are numerous potential attacks. For instance, a rogue PCN-

interior-node could PCN-mark all packets so that no flows were admitted. Another possibility is that it doesn't PCN-mark any packets, even when it is pre-congested.

Note that PCN-interior-nodes are not flow-aware. This prevents some security attacks where an attacker targets specific flows in the data plane -- for instance, for Denial-of-Service (DoS) or eavesdropping.

As regards Security Operations and Management, PCN adds few specifics to the general good practice required in this field [RFC4778]. For example, it may be sensible for a PCN-node to raise an alarm if it is persistently PCN-marking.

Security considerations are further discussed in [RFC5559].

Acknowledgements

This document is the result of extensive collaboration within the PCN WG. Amongst the most active other contributors to the development of the ideas specified in this document have been Jozef Babiarz, Bob Briscoe, Kwok-Ho Chan, Anna Charny, Georgios Karagiannis, Michael Menth, Toby Moncaster, Daisuke Satoh, and Joy Zhang. Appendix A is based on text from Michael Menth.

This document is a development of [Briscoe06-2]. Its authors are therefore also contributors to this document: Jozef Babiarz, Attila Bader, Bob Briscoe, Kwok-Ho Chan, Anna Charny, Stephen Dudley, Philip Eardley, Georgios Karagiannis, Francois Le Faucheur, Vassilis Liatsos, Dave Songhurst, and Lars Westberg.

Thanks to those who've made comments on the document: Joe Babiarz, Fred Baker, David Black, Bob Briscoe, Ken Carlberg, Anna Charny, Ralph Droms, Mehmet Ersue, Adrian Farrel, Ruediger Geib, Wei Gengyu, Fortune Huang, Christian Hublet, Ingemar Johansson, Georgios Karagiannis, Alexey Melnikov, Michael Menth, Toby Moncaster, Dimitri Papadimitriou, Tim Polk, Daisuke Satoh, and Magnus Westerlund.

References

Normative Reference

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate

              Requirement Levels", BCP 14, RFC 2119, March 1997.

Informative References

[Baker08] Baker, F., Polk, J., and M. Dolly, "DSCP for Capacity-

              Admitted Traffic", Work in Progress, November 2008.

[Briscoe06-1] Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,

              F., Charny, A., Babiarz, J., Chan, K., Dudley, S.,
              Karagiannis, G., Bader, A., and L. Westberg, "An edge-
              to-edge Deployment Model for Pre-Congestion
              Notification: Admission Control over a DiffServ
              Region", Work in Progress, October 2006.

[Briscoe06-2] Briscoe, B., Eardley, P., Songhurst, D., Le Faucheur,

              F., Charny, A., Liatsos, V., Babiarz, J., Chan, K.,
              Dudley, S., Karagiannis, G., Bader, A., and L.
              Westberg, "Pre-Congestion Notification marking", Work
              in Progress, October 2006.

[Briscoe08] Briscoe, B., "Byte and Packet Congestion

              Notification", Work in Progress, August 2008.

[Charny07] Charny, A., Babiarz, J., Menth, M., and X. Zhang,

              "Comparison of Proposed PCN Approaches", Work
              in Progress, November 2007.

[Menth10] Menth, M., Lehrieder, F., Briscoe, B., Eardley, P.,

              Moncaster, T., Babiarz, J., Chan, K., Charny, A.,
              Karagiannis, G., Zhang, X., Taylor, T., Satoh, D., and
              R. Geib, "A Survey of PCN-Based Admission Control and
              Flow Termination", IEEE Communications Surveys and
              Tutorials, 2010 (third issue), <http://
              www3.informatik.uni-wuerzburg.de/staff/menth/
              Publications/papers/Menth08-PCN-Overview.pdf>.

[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,

              "Definition of the Differentiated Services Field (DS
              Field) in the IPv4 and IPv6 Headers", RFC 2474,
              December 1998.

[RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang,

              Z., and W. Weiss, "An Architecture for Differentiated
              Services", RFC 2475, December 1998.

[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The

              Addition of Explicit Congestion Notification (ECN) to
              IP", RFC 3168, September 2001.

[RFC4778] Kaeo, M., "Operational Security Current Practices in

              Internet Service Provider Environments", RFC 4778,
              January 2007.

[RFC5127] Chan, K., Babiarz, J., and F. Baker, "Aggregation of

              DiffServ Service Classes", RFC 5127, February 2008.

[RFC5559] Eardley, P., "Pre-Congestion Notification (PCN)

              Architecture", RFC 5559, June 2009.

[RFC5696] Moncaster, T., Briscoe, B., and M. Menth, "Baseline

              Encoding and Transport of Pre-Congestion Information",
              RFC 5696, November 2009.

[Taylor09] Charny, A., Huang, F., Menth, M., and T. Taylor, "PCN

              Boundary Node Behaviour for the Controlled Load (CL)
              Mode of Operation", Work in Progress, March 2009.

Appendix A. Example Algorithms

Note: This Appendix is informative, not normative. It is an example of algorithms that implement Section 2 and is based on [Charny07] and [Menth10].

There is no attempt to optimise the algorithms. The metering and marking functions are implemented together. It is assumed that three encoding states are available (one for threshold-marked, one for excess-traffic-marked, and one for not-marked). It is assumed that all metered-packets are PCN-packets and that the link is never overloaded. For excess-traffic-marking, "packet size independent marking" applies.

A.1. Threshold-Metering and -Marking

A token bucket with the following parameters:

  *  PCN-threshold-rate: token rate of token bucket (bits/second)
  *  BS_tm: depth of token bucket (bits)
  *  threshold: marking threshold of token bucket (bits)
  *  lastUpdate: time the token bucket was last updated (seconds)
  *  F_tm: amount of tokens in token bucket (bits)

A PCN-packet has the following parameters:

  *  packet_size: the size of the PCN-packet (bits)
  *  packet_mark: the PCN encoding state of the packet

In addition there is the parameter:

     now: the current time (seconds)

The following steps are performed when a PCN-packet arrives on a link:

  *  F_tm = min(BS_tm, F_tm + (now - lastUpdate) * PCN-threshold-
     rate); // add tokens to token bucket
  *  F_tm = max(0, F_tm - packet_size); // remove tokens from token
     bucket
  *  if ((F_tm < threshold) AND (packet_mark != excess-traffic-
     marked)) then packet_mark = threshold-marked; // do threshold-
     marking, but don't re-mark packets that are already excess-
     traffic-marked
  *  lastUpdate = now // Note: 'now' has the same value as in step 1

A.2. Excess-Traffic-Metering and -Marking

A token bucket with the following parameters:

  *  PCN-excess-rate: token rate of token bucket (bits/second)
  *  BS_etm: depth of TB in token bucket (bits)
  *  lastUpdate: time the token bucket was last updated (seconds)
  *  F_etm: amount of tokens in token bucket (bits)

A PCN-packet has the following parameters:

  *  packet_size: the size of the PCN-packet (bits)
  *  packet_mark: the PCN encoding state of the packet

In addition there is the parameter:

  *  now: the current time (seconds)

The following steps are performed when a PCN-packet arrives on a link:

  *  F_etm = min(BS_etm, F_etm + (now - lastUpdate) * PCN-excess-
     rate); // add tokens to token bucket
  *  if (packet_mark != excess-traffic-marked) then // do not meter
     packets that are already excess-traffic-marked
     +  if (F_etm < 0) then packet_mark = excess-traffic-marked; //
        do excess-traffic-marking.  The algorithm ensures this is
        independent of packet size
     +  else F_etm = F_etm - packet_size; // remove tokens from
        token bucket if don't mark packet
  *  lastUpdate = now // Note: 'now' has the same value as in step 1

Appendix B. Implementation Notes

Note: This Appendix is informative, not normative. It comments on Section 2, including reasoning about whether MUSTs or SHOULDs are required. For guidance on Operations and Management considerations, please see [RFC5559].

B.1. Competing-Non-PCN-Traffic

In general, it is not advised to have any competing-non-PCN-traffic, essentially because the unpredictable amount of competing-non-PCN- traffic makes the PCN mechanisms less accurate and so reduces PCN's ability to protect the QoS of admitted PCN-flows [RFC5559]. But if there is competing-non-PCN-traffic, then:

1. There should be a mechanism to limit it, for example:

   *  limit the rate at which competing-non-PCN-traffic can be
      forwarded on each link in the PCN-domain.  One method for
      achieving this is to queue competing-non-PCN-packets
      separately from PCN-packets and to limit the scheduling rate
      of the former.  Another method is to drop competing-non-PCN-
      packets in excess of some rate.
   *  police competing-non-PCN-traffic at the PCN-ingress-nodes, as
      in the Diffserv architecture, for example.  However,
      Diffserv's static traffic conditioning agreements risk a
      focused overload of traffic from several PCN-ingress-nodes
      onto one link.
   *  by design, it is known that the level of competing-non-PCN-
      traffic is always very small -- perhaps it consists of
      operator control messages only.

2. In general, PCN's mechanisms should take account of competing-

   non-PCN-traffic, in order to improve the accuracy of the decision
   about whether to admit (or terminate) a PCN-flow.  For example:
   *  competing-non-PCN-traffic contributes to the PCN-meters;
      competing-non-PCN-packets are treated as metered-packets.
   *  each PCN-node, on its links: (1) reduces the reference rates
      (PCN-threshold-rate and PCN-excess-rate), in order to allow
      'headroom' for the competing-non-PCN-traffic; (2) limits the
      maximum forwarding rate of competing-non-PCN-traffic to be
      less than the 'headroom'.  In this case, competing-non-PCN-
      packets are not treated as metered-packets.

3. The operator should decide on appropriate action. Dropping is

   discussed further in Appendix B.4.

One specific example of competing-non-PCN-traffic occurs if the PCN- compatible Diffserv codepoint is one of those that [Baker08] defines as suitable for use with admission control and there is such non-PCN- traffic in the PCN-domain. A similar example could occur for Diffserv codepoints of the Real-Time Treatment Aggregate [RFC5127]. In such cases, PCN-traffic and competing-non-PCN-traffic are distinguished by different values of the ECN field [RFC5696].

Another example would occur if there is more than one PCN-compatible Diffserv codepoint in a PCN-domain. For instance, suppose there are two PCN-BAs treated at different priorities. Then as far as the lower priority PCN-BA is concerned, the higher priority PCN-traffic needs to be treated as competing-non-PCN-traffic.

B.2. Scope

It may be known, for instance by the design of the network topology, that some links can never be pre-congested (even in unusual circumstances, such as after the failure of some links). There is then no need to deploy the PCN-metering and -marking behaviour on those links.

The meters can be implemented on the ingoing or outgoing interface of a PCN-node. It may be that existing hardware can support only one meter per ingoing interface and one per outgoing interface. Then, for instance, threshold-metering could be run on all the ingoing interfaces and excess-traffic-metering on all the outgoing interfaces; note that the same choice must be made for all the links in a PCN-domain to ensure that the two metering behaviours are applied exactly once for all the links.

The baseline encoding [RFC5696] specifies only two encoding states (PCN-marked and not-marked). In this case, "excess-traffic-marked" means a packet that is PCN-marked as a result of the excess-traffic- meter function, and "threshold-marked" means a packet that is PCN- marked as a result of the threshold-meter function. As far as terminology is concerned, this interpretation is consistent with that defined in [RFC5559]. Note that a deployment needs to make a consistent choice throughout the PCN-domain whether PCN-marked is interpreted as excess-traffic-marked or threshold-marked.

Note that even if there are only two encoding states, it is still required that both the meters are implemented, in order to ease compatibility between equipment and to remove a configuration option and associated complexity. Hardware with limited availability of

token buckets could be configured to run only one of the meters, but it must be possible to enable either meter. Although, in the scenario with two encoding states, indications from one of the meters are ignored by the marking function, they may be logged or acted upon in some other way, for example, by the management system or an explicit signalling protocol; such considerations are out of the scope of this document.

B.3. Behaviour Aggregate Classification

Configuration of PCN-nodes will define what values of the DSCP and ECN fields indicate a PCN-packet in a particular PCN-domain. For instance, [RFC5696] defines the baseline encoding.

Configuration will also define what values of the DSCP and ECN fields indicate a competing-non-PCN-packet in a particular PCN-domain.

B.4. Dropping

The objective of the dropping function is to minimise the queueing delay suffered by metered-traffic at a PCN-node, since PCN-traffic (and perhaps competing-non-PCN-traffic) is expected to be inelastic traffic generated by real-time applications. In practice, it would be defined as exceeding a specific traffic profile, typically based on a token bucket.

If there is no competing-non-PCN-traffic, then it is not expected that the dropping function is needed, since PCN's flow admission and termination mechanisms limit the amount of PCN-traffic. Even so, it still might be implemented as a back stop against misconfiguration of the PCN-domain, for instance.

If there is competing-non-PCN-traffic, then the details of the dropping function will depend on how the router's implementation handles the two sorts of traffic:

1. a common queue for PCN-traffic and competing-non-PCN-traffic,

   with a traffic conditioner for the competing-non-PCN-traffic; or

2. separate queues, in which case the amount of competing-non-PCN-

   traffic can be limited by limiting the rate at which the
   scheduler (for the competing-non-PCN-traffic) forwards packets.

(The discussion here is based on that in [Baker08].)

Note that only dropping of packets is allowed. Downgrading of packets to a lower priority BA is not allowed (see Appendix B.7), since it would lead to packet mis-ordering. Shaping ("the process of delaying packets" [RFC2475]) is not suitable if the traffic comes from real-time applications.

Preferential dropping of competing-non-PCN-traffic:

  In general, it is reasonable for competing-non-PCN-traffic to get
  harsher treatment than PCN-traffic (that is, competing-non-PCN-
  packets are preferentially dropped) because PCN's flow admission
  and termination mechanisms are stronger than the mechanisms that
  are likely to be applied to the competing-non-PCN-traffic.  The
  PCN mechanisms also mean that a dropper should not be needed for
  the PCN-traffic.

Preferential dropping of excess-traffic-marked packets:

  Section 2.2 specifies, "If the PCN-node drops PCN-packets, then
  ...  PCN-packets that arrive at the PCN-node already excess-
  traffic-marked SHOULD be preferentially dropped".  In brief, the
  reason is that, with the "controlled load" edge behaviour
  [Taylor09], this avoids over-termination in the event of multiple
  bottlenecks in the PCN-domain [Charny07].  A fuller explanation is
  as follows.  The optimal dropping behaviour depends on the
  particular edge behaviour [Menth10].  A single dropping behaviour
  is defined, as it is simpler to standardise, implement, and
  operate.  The standardised dropping behaviour is at least adequate
  for all edge behaviours (and good for some), whereas others are
  not (for example, with tail dropping, far too much traffic may be
  terminated with the "controlled load" edge behaviour, in the event
  of multiple bottlenecks in the PCN-domain [Charny07]).  The
  dropping behaviour is defined as a 'SHOULD', rather than a 'MUST',
  in recognition that other dropping behaviour may be preferred in
  particular circumstances, for example: (1) with the "marked flow"
  termination edge behaviour, preferential dropping of unmarked
  packets may be better [Menth10]; (2) tail dropping may make PCN-
  marking behaviour easier to implement on current routers.

Exactly what "preferentially dropped" means is left to the implementation. It is also left to the implementation what to do if there are no excess-traffic-marked PCN-packets available at a particular instant.

Section 2.2 also specifies, "the PCN-node's excess-traffic-meter SHOULD NOT meter the PCN-packets that it drops." This avoids over- termination [Menth10]. Effectively, it means that the dropping function (if present) should be done before the meter functions -- which is natural.

B.5. Threshold-Metering

The description is in terms of a 'token bucket with threshold' (which [Briscoe06-1] views as a virtual queue). However, the description is not intended to standardise implementation.

The reference rate of the threshold-meter (PCN-threshold-rate) is configured at less than the rate allocated to the PCN-traffic class. Also, the PCN-threshold-rate is less than, or possibly equal to, the PCN-excess-rate.

Section 2.3 specifies, "If F_tm < threshold, then the meter indicates to the marking function that the packet is to be threshold-marked; otherwise, it does not." Note that a PCN-packet is marked without explicit additional bias for the packet's size.

The behaviour must be functionally equivalent to the description in Section 2.3. "Functionally equivalent" means the observable 'black box' behaviour is the same or very similar, for example, if either precisely the same set of packets is marked or if the set is shifted by one packet. It is intended to allow implementation freedom over matters such as:

o whether tokens are added to the token bucket at regular time

  intervals or only when a packet is processed.

o whether the new token bucket depth is calculated before or after

  it is decided whether to PCN-mark the packet.  The effect of this
  is simply to shift the sequence of marks by one packet.

o when the token bucket is very nearly empty and a packet arrives

  larger than F_tm, then the precise change in F_tm is up to the
  implementation.  For instance:
  *  set F_tm = 0 and indicate threshold-mark to the marking
     function.
  *  check whether F_tm < threshold and if it is, then indicate
     threshold-mark to the marking function; then set F_tm = 0.
  *  leave F_tm unaltered and indicate threshold-mark to the marking
     function.

o similarly, when the token bucket is very nearly full and a packet

  arrives larger than (BS_tm - F_tm), then the precise change in
  F_tm is up to the implementation.

Note that all PCN-packets, even if already marked, are metered by the threshold-meter function (unlike the excess-traffic-meter function), because all packets should contribute to the decision whether there is room for a new flow.

B.6. Excess-Traffic-Metering

The description is in terms of a token bucket, however the implementation is not standardised.

The reference rate of the excess-traffic-meter (PCN-excess-rate) is configured at less than (or possibly equal to) the rate allocated to the PCN-traffic class. Also, the PCN-excess-rate is greater than, or possibly equal to, the PCN-threshold-rate.

As in Section B.5, "functionally equivalent" allows some implementation flexibility, for example, the exact algorithm when the token bucket is very nearly empty or very nearly full.

Section 2.4 specifies, "A packet SHOULD NOT be metered (by this excess-traffic-meter function) ... if the packet is already excess- traffic-marked on arrival at the PCN-node". This avoids over- termination (with some edge behaviours) in the event that the PCN- traffic passes through multiple bottlenecks in the PCN-domain [Charny07]. Note that an implementation could determine whether the packet is already excess-traffic-marked as an integral part of its BA classification function. The behaviour is defined as a 'SHOULD NOT', rather than a 'MUST NOT', because it may be slightly harder to implement than a metering function that is blind to previous packet markings.

Section 2.4 specifies, "A packet SHOULD NOT be metered (by this excess-traffic-meter function) ... if this PCN-node drops the packet." This avoids over-termination [Menth10]. (A similar statement could also be made for the threshold-meter function but is irrelevant, as a link that is overloaded will already be substantially pre-congested and hence threshold-marking all packets.) It seems natural to perform the dropping function before the metering functions, although for some equipment it may be harder to implement; hence, the behaviour is defined as a 'SHOULD NOT', rather than a 'MUST NOT'.

"Packet size independent marking" -- excess-traffic-marking that is independent of packet size -- is specified as a 'SHOULD' rather than a 'MUST' in Section 2.4 because it may be slightly harder for some equipment to implement, and the impact of not doing so is undesirable but moderate (sufficient traffic is terminated, but flows with large packets are more likely to be terminated). With the "classic"

excess-traffic-meter behaviour, large packets are more likely to be excess-traffic-marked than small packets (because packets are marked if the number of tokens in the token bucket is smaller than the packet size). This means that, with some edge behaviours, flows with large packets are more likely to be terminated than flows with small packets ([Briscoe08], [Menth10]). "Packet size independent marking" can be achieved by a small modification of the "classic" excess- traffic-meter. The number of tokens in the bucket can become negative; if this number is negative at a packet's arrival, the packet is marked; otherwise, the amount of tokens equal to the packet size is removed from the bucket. Note that with "packet size independent marking", either the packet is marked or tokens are removed -- never both. Hence, the token bucket cannot become more negative than the maximum packet size on the link. The algorithm described in Appendix A implements this behaviour.

Note that BS_etm is independent of BS_tm, F_etm is independent of F_tm (except in that a packet can change both), and the two configured rates (PCN-excess-rate and PCN-threshold-rate) are independent (except that PCN-excess-rate >= PCN-threshold-rate).

B.7. Marking

Section 2.5 defines, "A PCN-node MUST NOT ...change a PCN-packet into a non-PCN-packet". This means that a PCN-node is not allowed to downgrade a PCN-packet into a lower priority Diffserv BA (hence, downgrading is not allowed as an alternative to dropping).

Section 2.5 defines, "A PCN-node MUST NOT ...PCN-mark a packet that is not a PCN-packet". This means that in the scenario where competing-non-PCN-packets are treated as metered-packets, a meter may indicate a packet is to be PCN-marked, but the marking function knows it cannot be marked. It is left open to the implementation exactly what to do in this case; one simple possibility is to mark the next PCN-packet. Note that unless the PCN-packets are a large fraction of all the metered-packets, the PCN mechanisms may not work well.

Although the metering functions are described separately from the marking function, they can be implemented in an integrated fashion.

Author's Address

Philip Eardley (editor) BT Adastral Park, Martlesham Heath Ipswich IP5 3RE UK

EMail: [email protected]