Implementing a VPN service with policy rules

Size: px
Start display at page:

Download "Implementing a VPN service with policy rules"

Transcription

1 Implementing a VPN service with policy rules Hanine ABDELKRIM, Noël VERHOEVEN ALCATEL Route de Nozay Marcoussis France Hanine.Abdelkrim@alcatel.fr Noel.Verhoeven@alcatel.fr Tel.: +33 (0) / + 33(0) Fax: +33 (0) Abstract Today s telecommunication service providers aim at reducing drastically the time for implementing a service in order to reduce the cost. Simultaneously, they want to provide a better quality of service. In this context, an identified solution at the Telecommunication Management Forum (TMF) was to propose a completely automated top-down management of the network using the definition of customer needs as input. In this paper, such a management is illustrated in the particular case of the implementation of a provider provisioned VPN service: starting from the expression of the customer needs and ending at the network configuration. More precisely, this implementation is defined in several steps, which are: the formalization of the customer needs within one or several service level specification(s) (SLS), the translation of these formal needs using specific policy information models and the implementation of these models in order to address the network layer. Keywords: Provider Provisioned VPN, SLA, SLS, policy-based management, policy information model, policy information base, service network mapping Introduction A crucial objective for a service provider (SP) is to have rapid response times to the service needs of its customers in order to be competitive: more sold services but less time for provisioning them. This requires automation [1] starting from the business layer to the network layer. At the business layer, a SP manages (written) contracts named service level agreement (SLA), which are established with its customers. In the SLA, all contracted aspects of a service are included: financial, technical, operational, etceteras. Focusing on the technical aspect, a contract contains a customeroriented description of a service: e.g. a transport link must be established

2 between two service access points (SAPs) with a given level of Quality of Service (QoS). For the purpose of automation, this technical description is formally contained in a standardized document named service level specification (SLS). Examples of SLSs are proposed in [2] and [3]. At the lower-end of the business layer, one or several SLS are produced formally describing the customers needs. In order to implement the customer oriented SLS by provisioning it into the network, the SP has a requirement to translate it into a SP-oriented description. Moreover, this translation must be computationally easy: it is quite difficult to directly translate an SLS into configuration commands of each network element of the SP s network. Policy-Based Management (PBM) provides an interesting solution satisfying both these requirements. The reason is not so much the usage of policy rules, but the high-level management view generally represented in existing policy information models: e.g. QPIM [4] represents a high-level view of the QoS for IntServ and DiffServ networks. The translation of an SLS, which is a high-level view of customer s needs, into policy rules (from appropriate policy information models) is feasible, as we illustrate in this paper. The resulting policy rules are SP-oriented. All SLSs are translated into policy rules at the upper-end of the network management layer. These policy rules are used for filling a Policy Information Base (PIB). This information base is a representation of abstract network functions (e.g. the dropping function of the DiffServ PIB [10]) of an abstract network element (vendor independent). For example, a policy rule from QPIM to be enforced on a DiffServ-enabled router is translated by populating the DiffServ PIB associated with such a router. This should be interpreted as a configuration of the abstract network functions defined in that PIB. As such, a PIB implements totally or partially a policy information model. Moreover, the final configuration information of a Network Element (NE) is simply a specialization of the configuration information contained in the PIB associated with that NE. Using the policy information model description of the service and a capability model of the network elements, we can translate the service into sets of network element configuration. So, we complete the implementation of a service that has started at the business layer as an SLS. This paper describes in detail all these steps in the scope of the IP VPN service: we present a textual description of an IP VPN service and its formal description (SLSs). Then we describe briefly the targeted policy information models (PIMs) and their implementations (PIBs), and finally we translate these SLSs into policy rules, which rules are defined in these targeted PIMs. We call this process Service Network Mapping (SNM). Please note that, at the network level, the scope is limited to the configuration of the edge routers of provider s networks supporting MPLS/DiffServ for the transport of packets and BGP/MPLS VPN [11]: we consider that the core of these networks is configured already. In addition, by stopping at PIB level we stay vendor-independent.

3 Introduction to the IP VPN service In this section, we introduce the IP VPN service, and more specifically an IP VPN called provider provisioned VPN. Then, we describe formally this service with an SLS. Description of the IP VPN The IP VPN service considered hereafter is named today "Provider Provisioned VPN" (PPVPN) instead of network-based VPN. The usage of this terminology is common but not the only one: e.g. within Alcatel has been adopted a VPN terminology that is a bit more specific: RA VPN (Remote Access VPN) using session based access, DA VPN (Dedicate Access VPNs) using fixed "leased line" access, Metro VPN and Secure VPN which is mostly overlay VPNs using encrypted tunnels. For implementing a PPVPN service, the service provider creates the VPN for the customer (typically an enterprise). He provides his customer with a routed infrastructure that acts as a private IP cloud realized over a public IP infrastructure owned by the SP or other SPs. The opposite of a PPVPN is the customer itself establishing the VPN, either by using a remote access VPN or a Customer Premises Equipment (CPE)-based VPN. Using remote access VPN means that the customer (typically an individual) establishes secure VPN tunnels over a public IP backbone or Internet; using CPEs involves, for example, VPN gateways owned by the customer (typically a small or medium enterprise) connected to such an infrastructure. Focusing on the PPVPN service, the SP must be informed about the characteristics of the customer s VPN: its topology and reachability of VPN destinations. In addition, if the customer wants private addresses, the SP has to enable Network and port Address Translation (NAT) functionality to provide for routing connectivity. The SP can also give a set of VPN addresses to the customer, that the latter must use and translate to. Service Providers likely implement the last scenario. An SP can also provide additional services such as firewall and encryption (more dedicated to remote access VPN). Finally, an SP can offer SLAs on traffic flows (i.e. throughput and QoS). An important issue is on granularity of QoS: the SP may offer aggregate SLAs or propose treatment of customer traffic on micro-flow level. Here, a mixed solution is proposed: customer traffic is described in term of micro-flows within the SLS but a SP may aggregate this traffic once entering its core network. To summarize, the PPVPN service requires the following points to be characterized: Reachability NAT Firewall Encryption

4 Please note that these characterizations of the VPN are not complete. Missing points concern the transport of packets: topology of the VPN (links between sites of a VPN), QoS contract per link including traffic identification, QoS values and throughput. SLS of an IPVPN service The SP does not deal directly with the SLA. The SLS is derived from the SLA and describes the technical part of the associated SLA. The SLS is used for the implementation of the PPVPN service. A technical description of a PPVPN service, in other words an SLS, should consist of a technical description of a generic transport of packets service with QoS indicators and of a VPN specific part built on top of this transport service. In the following paragraphs, we propose an example of a description, compliant with Tequila [2], of the main components of an SLS formalizing a generic transport service. These components are: The scope of the service: a set of ingress and egress network interface of network node located at the edge of the provider s network. The scope defines also how these interfaces are related to each other with pipe(s), hose(s) or funnel(s) topologies. In this paper, these ingress and egress interfaces are also named input and output SAPs respectively. The flow description: identification of the traffic to transport. The traffic profile and conformance test algorithm: for example token bucket. The excess treatment: dropping, shaping or remarking out-of profile traffic or ignore the traffic. The performance guarantees: QoS defined as delay, jitter, packet loss, throughput. The service schedule: (de)activation time in terms of time of day, day of month, month of year, and any repetition that is needed. The reliability: maximum allowed downtime per year and maximum time to repair. In addition to these components and for addressing the PPVPN service, this SLS is to be completed with the following components: Reachability: defines the visibility of each site from each other site pertaining to the VPN. Firewall: defines which traffic is allowed or denied (a per-micro flow basis). NAT: network and port address translation in a per-micro flow basis. Encryption: defines encryption in a per-traffic basis.

5 As a last point, the description of a VPN service may require several (related) SLSs. Policy information models Policy Information Models use policy rules for representing high level management functions. An important point is the abstraction of the representation used in a policy information model. The aim is in fact to enable a human network management operator to easily define powerful and simple rules. So, we use policy information models because the mapping of an SLS into these models is simplified. The first policy information model document titled Policy Core Information Model (PCIM) has been released in February 2001[7]. This work is inspired by the work done at the DMTF on the Common Information Model [5] [6]. An extension to PCIM is about to be standardized and named PCIM extension (PCIMe) [8]. Several other PIMs are under study: the quality of service (QPIM: QoS Policy Information Model) [4] and the security for IP networks (ICIM: IPSec Configuration Policy Model) are the most mature. Work on MPLS (Multi- Protocol Label Switching) and layer three virtual private networks is in progress. A Policy Information Model is implemented as a Policy Information Bases (PIBs). A PIB represents abstract network functions (e.g. QoS) of an abstract network element. At least, one PIB is to be defined for implementing a policy information model: e.g. the DiffServ PIB [10] implements QPIM in the limited scope of DiffServ networks. There are as much instances of a PIB as network elements that are capable of and identified for realizing network functions, which are represented in this PIB. The subsection below about PCIMe details how the policy rules are progressively distributed to the targeted network elements. Finally, it is important to define PIMs that are suitable for the implementation of a VPN service. Considering the assumed limitation to the configuration of the edge of an MPLS/DiffServ network, the targeted PIMs are: an IPVPN PIM strictly for the VPN part, QPIM for the QoS part and PCIMe as background model. These form the basis of models that we need to implement the translations. A description of these models and of their implementation is given in the next sections. The PCIMe model PCIMe introduces the basis for policy-based management: policy rule, policy condition, policy action, policy and policy group are defined in this model. PCIMe is in fact a meta-model and other PIMs, for example QPIM, specialize this model. Because the PCIMe is the core model of policy-based management, its implementation is mixed up with the implementation of a policy-based management system. A common implementation [9] is based on a policy

6 manager, a policy distribution point (PDP) and a policy enforcement point (PEP) related to each other as illustrated in Figure 1: in this figure the PEP is separated from the network element (NE) but it can also be embedded within the NE. The enforcement points associated with each policy rule specify how these rules will be distributed from the policy manager to the network element. Policy Repository Policy Manager 2bis PDP PIBs 4 PEP PIB 5 1: Policy rules creation 2: Policy rules are stored in the repository 2 bis: Using the enforcement point(s) associated with each policy, the policy manager informs the right PDP(s) of new updated rules 3: the concerned PDP, maybe several, retrieves the policy rules, translates them and populates corresponding policy information base(s) (PIBs) 4: the PDP sends PEPs PIB updates. Each PEP updates its PIB. Network Element 5: PEP translates the PIB into configuration of the managed Network Element (e.g. router). See Mapping from PIB data to device configuration subsection. The QPIM model Figure 1. Policy-based management QPIM [4] defines policy rules for QoS in DiffServ or IntServ networks concerning the edge and the core of these networks. Focusing on DiffServ networks: QPIM defines traffic flow conditioning (i.e. testing and limiting entering traffic flows) at the edge, and per hop forwarding behaviour (bandwidth, queuing and dropping) of each router of the core. Within the PDP, this model is implemented as a Policy Information Base. A specification is given in [10]. Figure 2 illustrates an example of configuration according to this PIB. A data path represents an ingress or egress interface of the router. The classifier is defined per interface and puts packets into classes according to the filter. Once classified, the meter determines whether the packet is in profile or out of profile according to a conformance test algorithm (e.g. a token bucket algorithm). According to the test, the meter must perform resulting actions such as counting and marking of the traffic flow with a DiffServ Code Point (DSCP) value or simply dropping the packets. Moreover, the queuing discipline is defined according to the meter: the traffic for output is put in a queue defined by a scheduler (e.g. priority queuing). Within the PEP, the PIB is translated into device commands. This work is much easier if the implementation within the routers is near the functional model defined in the PIB. This is typically the case in a DiffServ-enabled router.

7 Data Path Classifier Element Filter Conformance algorithm Meter Tokenbucket DSCP mark Classifier Classifier Element In-profile Out-profile Action Queue Scheduler Action Drop Priority Queue Figure 2. Functional model of a DiffServ-enabled router The IPVPN PIM model The IP VPN model is a proprietary model defined internally in Alcatel. This model defines rules related to the Reachability, NAT, Firewall and Encryption. It addresses only specific PPVPNs as specified in RFC 2547 bis [11] and based on BGP/MPLS PPVPN. Next, we explain how each aspect of a PPVPN is represented using policy actions [8]. Two main concepts used in our IP VPN model must be introduced. These are the VRF and the Route Distribution: VRF (Virtual Routing and Forwarding) is a routing table specific for a VPN defined at a provider edge (PE) node[11]. This table must be related to ingress interfaces of a PE. In fact, an ingress interface implements one SAP of a customer s site. In term of security, the VRF holds an important role and must be defined carefully: there is no security reason that prevents to relate customer sites (trough their network interface with the SP) to the same VRF. The Route Distribution defines which site (of a customer) or group of sites (of the same or different customers) is accessible from another site or group of sites. For example, a Route Distribution from Site A to Site B means that any host from A is accessible from any host of B. In the model, these concepts are represented with two new specific policy actions [8] named ConfigureVRFPolicyAction and ProvisionVRFPolicyAction respectively. The first action enables to create a VRF and to attach ingress interfaces to this VRF. The second action enables to define route distribution between sites. About the NAT aspect: one policy action named NATPolicyAction is sufficient for representing NAT without the port translation, which is a feature not

8 implemented yet in the current version of the model. The following operations (on a per-traffic basis) can be represented: Translating a set of IP addresses (named inside addresses) into a set of global addresses (also named outside addresses). There is a one-to-one mapping between these sets. There are two cases: dynamic and static translation. In the first case, the mapping is done automatically. In the second case, the translation is completely specified. Translating a set of IP addresses into a smaller set of global addresses. In this case, the several inside addresses may be mapped to the same global address. The implementation is assumed to be able to distinguish flow from or destined to the same global address: e.g. using the port number. Next aspect is the firewall configuration. A firewall allows or drops an identified traffic flow and simultaneously triggers an alert or stores the decision (i.e. this allow or drop) in a log file. In this case also, one policy action named FirewallPolicyAction represents firewall in our model. Last aspect is the encryption. The encryption is enforced on traffic identified by the source and destination addresses. This traffic is transported across the provider network with a security that must define the key exchange and communication protection algorithms. Similarly, one policy action named EncryptionPolicyAction is necessary for representing the encryption feature in the model. As for QPIM, the IP VPN model is implemented as a PIB within the PDP and the PEP. This PIB contains a vendor independent representation of a BGP/MPLS VPN function of a network element. The latter is named Provider Edge (PE) in [11]. It has to be noted that the NAT, Firewall and security functions are not considered yet: they will probably be defined in another PIB. A specification of this PIB is given in [13]. Figure 3 is an illustration of this PIB. The VRF object represents a real VRF [11] within the PE and must be associated with MPLS/VPN input interfaces of the PE. The Routing object contains configuration and monitoring information about routes of a VRF. The Route Target object contains information in order to configure and monitor route targets [11] for a particular VRF. The BGP Peer object contains the BGP peers [11] of the PE for a particular VRF. Moreover, there is some information about routing capabilities in terms of protocol support and maximum number of routes per VRF and, about interface capabilities essentially in terms of MPLS support.

9 Routing VRF Route Target BGP Peer Figure 3. BGP/MPLS VPN PIB Mapping the SLS into policy rules We have defined the parts of the SLS. We also described the targeted PIMs and we showed a brief overview of their implementation, addressing the network elements of the SP s network (edge only). This section fills the gap between the SLS and the policy models. It describes how the SLS is mapped, in a percomponent basis, into the targeted PIMs. The mapping of an SLS results in several policy rules. There is a direct correspondence between an SLS and the set of policy rules resulting from the mapping: modifying an SLS means updating this policy rule set, removing one or several policy rules from this set, adding one or more rules to this set or a combination of the three. Moreover, the enforcement point must be defined for each policy rule in order to be able to enforce the policy at the network level in a specific PEP. Finally, the mapping is defined in the limited scope of the management of the edge part of a network. The network functions at the edge are the traffic conditioning and VPN functions. The mapping below is presented according to these functions in the following order. First, mapping of the SLS components related to the traffic conditioning and then SLS components related to the VPN. There are two exceptions: the schedule and the performance guarantee components are mapped separately. Service schedule component The schedule component is mapped as a specific simple condition from PCIMe: PolicyTimePeriodCondition. This condition is only used for the mapping of other SLS components, which are described in the following subsections. QoS component The QoS or performance guarantee component is simply implemented as a DiffServ CodePoint (DSCP) [12]. Which DSCP? It depends on the core network

10 configuration, which is assumed already and adequately done. According to this configuration, each DSCP is associated with a performance guarantee. A match between the performance guarantee defined in the SLS and a configured performance guarantee will give the DSCP value. The performance guarantees to be selected by the customer in his SLA and translated in to the SLS are directly depending on the available core performance guarantees (DSCP value). This DSCP value is used for defining the traffic conditioning (see next section). If there is no defined performance guarantee, the DSCP is set to a value corresponding to a best effort service. Traffic conditioning related components The traffic conditioning is defined according to the scope, flow identification, traffic profile, excess treatment components of the SLS and requires the DSCP resulting from the mapping of the performance guarantee component defined in the previous section. The traffic conditioning is implemented as only one policy rule (named TrafficConditioning in Figure 4). In the approach we adopt in this section, the compound condition of this rule implements the flow identification and schedule components. The action part implements the Traffic Profile and the conformance algorithm component. The resulting policy rule is to be enforced on each interface identified as SAP in the scope component of the SLS. More precisely, this policy rule is to be enforced on the traffic entering if an interface is identified as an ingress SAP and on the outgoing traffic if an interface is identified as an egress SAP. In terms of the models, the traffic conditioning is implemented as an instance of the class PolicyRule [8] associated with its condition and action parts by means of instances of the PolicyConditionInPolicyRule [8] and PolicyActionInPolicyRule [8], respectively. More precisely, this policy rule is built as follows: The condition part of this rule is an CompoundPolicyCondition [8] associated with the conditions on the flow identification and on the validity period by means of an instance of the class PolicyCondtionInPolicyCondition [8]. The flow identification is mapped as at least one simple condition: a simple condition is defined by using a PolicyVariable [4] and a PolicyValue [4]. The validity period condition is defined in the Schedule subsection. The action part of this rule is an QosPolicyPoliceAction [4] implementing the conformance test to a traffic profile and the associated actions to trigger. Possible actions on out-ofprofile traffic are transmitting, dropping, remarking, shaping. Possible actions on in-profile traffic is only transmitting with a given DSCP computed as specified in the above subsection named QoS.

11 The figure below illustrates the generic form of a policy rule implementing traffic conditioning. Traffic conditioning instance of the class PolicyRule Association PolicyActionInPolicyRule Association PolicyConditionInPolicyRule Conformance Test instance of the action QoSPolicyPoliceAction [QPIM] Traffic Profile QoSPolicyTokenBucketTrfcProf [QPIM] Flow-Identification-and Validity- Period CompoundCondition Association QoSTrfcProfInAdmissionAction [QPIM] Figure 4. Traffic conditioning policy rule Figure 5 illustrates an example of mapping of a flow identification component describing an ingress traffic of packets marked with a DSCP comprised between 1 and 5. Association PolicyConditionInPolicyCondition Traffic identification instance of the class CompoundPolicyCondition Instance of the class SimplePolicyCondition Association PolicyVariableInSimplePolicyCondtion Association ExpectedPolicyValuesForVariable Instance of the class PolicyDSCPVariable PolicyIntegerValue with the property IntegerList set to Association PolicyValueInSimplePolicyCondition PolicyIntegerValue with the property IntegerList set to Figure 5. Flow identification mapping example Finally, Figure 6 is an illustration of the implementation of the action performed on in-profile traffic. Conformamce Test instance of the action QoSPolicyPoliceAction [QPIM] QoSPolicyConformAction [QPIM] PolicyVariableInSimplePolicyAction PolicyDSCPVariable SimplePolicyAction PolicyIntegerValue with the property IntegerList set to the DSCP value obtained from the mapping of the QoS component Traffic Profile QoSPolicyTokenBucketTrfcProf [QPIM] Figure 6. Marking operation of in-profile traffic

12 VPN related components The mapping to the IP VPN model may result in several policy rules defining reachability, NAT, Firewall and Encryption. These are the main rules that have to be enforced on the interface corresponding to the SAP defined in the scope component of the SLS; however policy rules defining reachability are enforced on the appropriate PE. Reachability The reachability component can be implemented as one or several policy rules: one rule per VRF. However, each rule is defined similarly: the condition part of this rule is a time validity period and the action part is one action, ProvisionVRFPolicyAction, defined in [14]. The only property of this action is set to the list of SAPs (to associate with the VRF) as defined in the reachability component. The rule we created is to be enforced on the appropriate PEs, which are deduced from the definition of the reachability component of the SLS. Figure 7 gives an illustration of this rule. PolicyConditionInPolicyRule PolicyRule PolicyActionInPolicyRule ValidityPeriod PolicyTimerPeriodCondition instance of the action ProvisionVRFPolicyAction with the property Interface set to the list of SAP IP addresses to associate with this VRF Figure 7. A VRF creation The Reachability component also defines the routing of packets within a VPN and can be implemented as one or several policy rules. Each rule represents the accessibility of several sites (named source sites) to several other sites (named destination sites). Thus, the number of rules depends on the definition of the accessibility. Each rule illustrated below is defined similarly: the condition part is the time validity period and the action part is one action, ConfigureVRFPolicyAction, defined in [14]. This rule is to be enforced on PEs attached to source sites. The figure below is an illustration of a rule enabling the distribution of routes from site A to site B only. PolicyConditionInPolicyRule PolicyRule PolicyActionInPolicyRule ValidityPeriod PolicyTimerPeriodCondition ConfigureVRFPolicyAction with the properties set as follows: distributionsouirce: SAP of sitre A distributiondestination: SAP of site B Figure 8. A route distribution

13 Network and Port Address Translation We implement one NAT component as one policy rule, which is defined as follows. The condition part of this rule is the result of the mapping of the flow Identification and schedule components (see traffic conditioning subsection). The action part is a CompoundPolicyCondition [8] of NATPolicyAction. The only two properties of the NATPolicyAction are set as follows: the translatefromipv4address property is set to the value of an IP address to translate. the translatetoipv4address property is set to the value of a global IP address. Each resulting policy rule is to be enforced on the interface(s) of the edge node(s) implementing SAP(s) identified in the scope component of the SLS. Figure 9 gives an example of a rule translating a local IP address to a global IP address. This rule is to be enforced on traffic identified in the condition and during a given validity period. PolicyConditionInPolicyRule PolicyRule PolicyActionInPolicyRule TrafficIdentification-ValidityPeriod CompoundCondition NATPolicyAction [IP VPN PIM] with the properties set as follows: origin address: local IP address target address: GLobal IP address Figure 9. Network and Port address translation mapping example Firewall We map one firewall component to one policy rule. This rule is defined as follows. The condition part of this rule is the result of the mapping of the flow identification and schedule components (as defined for the traffic conditioning). The action part is a FirewallPolicyAction. This policy rule is to be enforced on concerned PE(s) providing input SAP(s) defined in the scope component. Figure 10 is an illustration of a rule denying (with notification) an identified traffic during a given validity period. PolicyConditionInPolicyRule PolicyRule PolicyActionInPolicyRule TrafficIdentification-ValidityPeriod CompoundCondition FirewallPolicyAction [IP VPN PIM] with the property firewallaction set to deny and alarm Figure 10. Firewall component mapping example

14 Encryption We map one encryption component to one policy rule, which is defined as follows. The condition part is the result of the mapping of the flow Identification and schedule components. The action part is an instance of the action EncryptionPolicyAction. This policy rule is to be enforced on input SAPs defined in the scope component of the SLS. It has to be noted that the output SAPs are used in the rule definition. The figure below is an illustration of rule encrypting identified traffic using a DES algorithm during a validity period. PolicyConditionInPolicyRule PolicyRule PolicyActionInPolicyRule TrafficIdentification-ValidityPeriod CompoundCondition EncryptionPolicyAction [IP VPN PIM] with the properties set as follows: Peer identity: edge node(s) providing output SAPs ipsececnryption: DES Figure 11. Encryption component mapping example Mapping from PIB data to device configuration As mentioned in the PCIMe subsection, the network device abstracted Policy Rules in the PIB need to be translated into specific network element (NE) configuration commands. If the PIB model is close to the NE functional information model, this mapping is easy. This is true for NE s that are not policy aware. This is still the majority of the existing NE s. If the NE is policy aware, a copy of the PIB will (partially) exist in the NE and no translation is necessary, only a distribution to this PIB. If translation is necessary, it is a t the distribution point. If it is a legacy NE, the PIB information needs to be translated into CLI commands, SNMP messages or other to be send to the NE. Conclusion This document shows that it is possible to completely implement a service from a textual description to the configuration of network elements. The following points should be highlighted: The SLS template is very powerful for formally expressing customer s requirements. Indeed, the SLS template is fully customer-oriented. The policy-based management is very efficient for specifying a high level configuration of the provider network. How to measure this efficiency? This is the ability to simply implement an SLS with policy rules and to enforce these rules on the network without technological consideration. The policy information models must be correctly designed for

15 addressing this efficiency. These models are PCIMe [8], QPIM [4], and the IP VPN PIM [14]. Another result is the validation of the use of policy information models for configuring the network. For example, the IP VPN policy information model aims to configure the routers for activation of a VPN service. Usually, the policy information models are mainly related with the control of traffic: traffic conditioning, admission control. What comes next? Our IP VPN model can evolve to a more generic model covering other possible implementations, e.g. tunnel-based VPN. We have also to take into account the reliability and monitoring aspect of a VPN service. Another important step is to extend the scope of the information models to the core part. The work to be done is similar to the work realised now: specifying an appropriate model of the core configuration and implementing this model, which will likely be a bandwidth broker function. Finally, this paper illustrates the work done in Alcatel about a top-down management directly using the customer needs as input. This is an important step toward a totally customer-oriented management product. References [1] TeleManagement Forum, GB 910, Telecom Operations Map, March 2000 [2] IST TEQUILA, Traffic Engineering for QoS in the Internet, at Large Scale, [3] EURESCOM-P1008, Inter-operator interfaces for ensuring end to end QoS, [4] IETF-draft, Policy QoS Information Model, draft-ietf-policy-qos-infomodel-03.txt, Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, April 2001, work in progress, expired in November 2001 [5] DMTF, DMTF Technologies : CIM Standards << CIM Schema : Version 2.4, [6] DMTF, Common Information Model (CIM) Specification, version 2.2, June 1999, [7] IETF-RFC 3060, Policy Core Information Model -- Version 1 Specification, B. Moore, E. Ellesson, J. Strassner, A. Westerinen, February 2001 [8] IETF-draft, Policy Core Information Model Extensions, draft-ietf-policypcim-ext-04.txt, B. Moore, L. Rafalow, Y. Ramberg, Y. Snir, A. Westerinen, R. Chadha, M. Brunner, R. Cohen, J. Strassner, September 2001, work in progress, expire in March 2002 [9] IETF-RFC 2753, A Framework for Policy-based Admission Control, R.Yavatkar, D. Pendarakis, R. Guerin, January 2000

16 [10] IETF-draft Differentiated Services Quality of Service Policy Information Base, draft-ietf-diffserv-pib-06.txt, M. Fine, K. McCloghrie, J. Seligson, K. Chan, S. Hahn, C. Bell, A. Smith F. Reichmeyer, March 2002, work in progress, expires September 2002 [11] BGP/MPLS VPNs, draft-ietf-ppvpn-rfc2547bis-00, E.C. Rosen, July [12] IETF-RFC 2475 An Architecture for Differentiated Services S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, W. Weiss, December 1998, informational [13] IETF-draft, BGP/MPLS VPN Policy Information Base, draft-yacine-ppvpn- 2547bis-pib-00.txt, Yacine El Mghazli, April 2002, expires October 2002 [14] IETF-draft, IP VPN information model, draft-iyer-ipvpn-informationmodel-01, M. Iyer, A. Gonguet, C. Jaquenet, P. lago, R. Scandarioto, February 2002, work in progress, expires August 2002.

A Policy Information Model for RFC2547 -like IP VPNs

A Policy Information Model for RFC2547 -like IP VPNs A Policy Information Model for RFC2547 -like IP VPNs Arnaud Oonguet, Olivier Poupel Alcatel R&l, Route de Nozay, 91460 Marcoussis, France Abstract: This article presents a Policy Infonnation Model for

More information

Service Level Specifications, Cornerstone to E2E QoS across the Internet?

Service Level Specifications, Cornerstone to E2E QoS across the Internet? Service Level Specifications, Cornerstone to E2E QoS across the Internet? Yves T Joens Project Manager Network Strategy Group Yves T Joens, Washington 25-26 October page n 1» Outline IP Research in Europe

More information

Defining Reusable Business-Level QoS Policies for DiffServ

Defining Reusable Business-Level QoS Policies for DiffServ Defining Reusable Business-Level QoS Policies for DiffServ André Beller, Edgard Jamhour, Marcelo Pellenz Pontifícia Universidade Católica do Paraná PUCPR, PPGIA Curitiba, PR, Brazil abeller@ig.com.br,

More information

IP Differentiated Services

IP Differentiated Services Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks

More information

Differentiated Services

Differentiated Services 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service Definition of

More information

In the world of networks, control techniques

In the world of networks, control techniques NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation

More information

Update on IP VPN work in ITU-T

Update on IP VPN work in ITU-T Update on IP VPN work in ITU-T Marco CARUGI France Télécom R&D marco.carugi@francetelecom.fr San Diego - December 2000 PPVPN-14.12.00-Carugi 1 ITU work on IP VPNs starts in Kyoto, March 00 Study Group

More information

Differentiated Services

Differentiated Services Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service

More information

PROTOCOLS FOR COMMUNICATION BETWEEN QOS AGENTS: COPS AND SDP

PROTOCOLS FOR COMMUNICATION BETWEEN QOS AGENTS: COPS AND SDP PROTOCOLS FOR COMMUNICATION BETWEEN QOS AGENTS: COPS AND SDP Daniel Zinca 1, Virgil Dobrota 1, Cristian-Mihai Vancea 1, Gabriel Lazar 1 Department of Communications Technical University of Cluj-Napoca

More information

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Christos Bouras and Dimitris Primpas Research Academic Computer Technology Institute, N.Kazantzaki

More information

INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON

INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARISON INTEGRATED SERVICES AND DIFFERENTIATED SERVICES: A FUNCTIONAL COMPARON Franco Tommasi, Simone Molendini Faculty of Engineering, University of Lecce, Italy e-mail: franco.tommasi@unile.it, simone.molendini@unile.it

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

QoS, Security, and Mobility Management for Fixed and Wireless Networks under Policy-based Techniques

QoS, Security, and Mobility Management for Fixed and Wireless Networks under Policy-based Techniques QoS, Security, and Mobility Management for Fixed and Wireless Networks under Policy-based Techniques Guy Pujolle and Hakima Chaouchi UP6, University of Paris 6,8 rue du Capitaine Scott, 75015, Paris, France

More information

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di

More information

Internet Engineering Task Force (IETF) December 2014

Internet Engineering Task Force (IETF) December 2014 Internet Engineering Task Force (IETF) Request for Comments: 7417 Category: Experimental ISSN: 2070-1721 G. Karagiannis Huawei Technologies A. Bhargava Cisco Systems, Inc. December 2014 Extensions to Generic

More information

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Achim Autenrieth (1) *, Andreas Kirstädter (2) (1) Munich University of Technology Institute

More information

EE 122: Differentiated Services

EE 122: Differentiated Services What is the Problem? EE 122: Differentiated Services Ion Stoica Nov 18, 2002 Goal: provide support for wide variety of applications: - Interactive TV, IP telephony, on-line gamming (distributed simulations),

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

Differentiated Service Router Architecture - Classification, Metering and Policing

Differentiated Service Router Architecture - Classification, Metering and Policing Differentiated Service Router Architecture - Classification, Metering and Policing Presenters: Daniel Lin and Frank Akujobi Carleton University, Department of Systems and Computer Engineering 94.581 Advanced

More information

Diffserv over MPLS QoS Policy Management

Diffserv over MPLS QoS Policy Management Diffserv over MPLS QoS Policy Management Yin Ling Liong 1, Roberto Barnes 2, Man Li 1 1 Nokia Research Center, 5 Wayside Rd Burlington, MA 01803, USA {Yin-ling.Liong, Man.M.Li}@nokia.com 2 Nokia Research

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000 Network Working Group Y. Bernet Request for Comments: 2996 Microsoft Category: Standards Track November 2000 Status of this Memo Format of the RSVP DCLASS Object This document specifies an Internet standards

More information

Network Working Group. Expires: February 3, 2019 LabN Consulting, L.L.C. S. Ratliff VT idirect August 2, 2018

Network Working Group. Expires: February 3, 2019 LabN Consulting, L.L.C. S. Ratliff VT idirect August 2, 2018 Network Working Group Internet-Draft Intended status: Standards Track Expires: February 3, 2019 B. Cheng D. Wiggins MIT Lincoln Laboratory L. Berger LabN Consulting, L.L.C. S. Ratliff VT idirect August

More information

MPLS & Frame Relay Alliance. MPLS PVC User to Network Interface. Implementation Agreement MPLS & FR 2.0.1

MPLS & Frame Relay Alliance. MPLS PVC User to Network Interface. Implementation Agreement MPLS & FR 2.0.1 MPLS & Frame Relay Alliance MPLS PVC User to Network Interface Implementation Agreement MPLS & FR 2.0.1 MPLS & Frame Relay Alliance Technical Committee May 2003 Note: The user s attention is called to

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Internet protocol aspects Transport

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Internet protocol aspects Transport International Telecommunication Union ITU-T Y.1315 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2006) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d) Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning

WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning WBEM-based SLA Management across multi-domain networks for QoS-guaranteed DiffServ-over-MPLS Provisioning Jong-Cheol Seo 1, Hyung-Soo Kim 2, Dong-Sik Yun 2, Young-Tak Kim 1, 1 Dept. of Information and

More information

Network Design with latest VPN Technologies

Network Design with latest VPN Technologies Network Design with latest VPN Technologies Carsten Rossenhövel Managing Director Which VPN type fits the purpose? SOHO Teleworkers Internet Branch Office Questions to identify: What are the business goals?

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Trafffic Engineering 2015/16 1

Trafffic Engineering 2015/16 1 Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic

More information

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Introduction Much more bandwidth is available now than during the times of 300-bps modems, but the same business principles

More information

Admission Control over DiffServ using Pre-Congestion Notification

Admission Control over DiffServ using Pre-Congestion Notification Admission Control over DiffServ using Pre-Congestion Notification Philip Eardley, Bob Briscoe, Dave Songhurst - BT Research Francois Le Faucheur, Anna Charny Cisco Kwok-Ho Chan, Joe Babiarz - Nortel IETF-64

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2475 Category: Informational S. Blake Torrent Networking Technologies D. Black EMC Corporation M. Carlson Sun Microsystems E. Davies Nortel UK Z. Wang Bell Labs

More information

HSCN Quality of Service (QoS) Policy

HSCN Quality of Service (QoS) Policy HSCN Quality of Service (QoS) Policy Published March 2018 Copyright 2018 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Department of Computer Systems Faculty of Information Technology University of Technology,

More information

QoS for Real Time Applications over Next Generation Data Networks

QoS for Real Time Applications over Next Generation Data Networks QoS for Real Time Applications over Next Generation Data Networks Final Project Presentation December 8, 2000 http://www.engr.udayton.edu/faculty/matiquzz/pres/qos-final.pdf University of Dayton Mohammed

More information

Author : S.chandrashekhar Designation: Project Leader Company : Sasken Communication Technologies

Author : S.chandrashekhar Designation: Project Leader Company : Sasken Communication Technologies White Paper On Sasken IP Quality of Service Integrated Services Operation Over Differentiated Service Networks & Policy Based Admission Control in RSVP Author : S.chandrashekhar Designation: Project Leader

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

Domain Based Metering

Domain Based Metering Domain Based Metering Róbert Párhonyi 1 Bert-Jan van Beijnum 1 1 Faculty of Computer Science, University of Twente P.O. Box 217, 7500 AE Enschede, The Netherlands E-mail: {parhonyi, beijnum}@cs.utwente.nl

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper January 2015 Copyright 2015 AireSpring Introduction Today s modern enterprises employ IT technologies that deliver higher value,

More information

TEQUILA Engineering Approach

TEQUILA Engineering Approach TEQUILA Approach David Griffin University College London, UK Premium IP Cluster Joint Review, 3-4 April 2001 Overview Service Subscription GUI Forecast Service Subscription LDAP Service Subscriptions Repository

More information

Peer to Peer Infrastructure : QoS enabled traffic prioritization. Mary Barnes Bill McCormick

Peer to Peer Infrastructure : QoS enabled traffic prioritization. Mary Barnes Bill McCormick Peer to Peer Infrastructure : QoS enabled traffic prioritization Mary Barnes (mary.barnes@nortel.com) Bill McCormick (billmcc@nortel.com) p2pi - QoS 1/24/09 1 Overview!! Discuss the mechanisms and implications

More information

Integrating Network QoS and Web QoS to Provide End-to-End QoS

Integrating Network QoS and Web QoS to Provide End-to-End QoS Integrating Network QoS and Web QoS to Provide End-to-End QoS Wang Fei Wang Wen-dong Li Yu-hong Chen Shan-zhi State Key Lab of Networking and Switching, Beijing University of Posts & Telecommunications,

More information

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality Preface p. xi Acknowledgements p. xv List of Figures p. xvii List of Tables p. xxi Abbreviations p. xxiii Drivers for the Adoption of Multi-service Networks p. 1 Customer Perspective p. 2 Network Operator

More information

The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains

The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains The NSIS QOS Model for Inter-domain Signaling to Enable End-to-End QoS Provisioning Over Heterogeneous Domains Jian Zhang and Edmundo Monteiro Laboratory of Communications and Telematics (LCT), University

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

IP QoS Support in the Internet Backbone OCTOBER 2000

IP QoS Support in the Internet Backbone OCTOBER 2000 IP QoS Support in the Internet Backbone OCTOBER 2000 T e c h n i c a l P a p e r IP QoS Support in the Internet Backbone Quality of Service in the Internet 1 IP QoS Architectures 1 Integrated Services

More information

Contents. QoS overview 1

Contents. QoS overview 1 Contents QoS overview 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 1 QoS techniques overview 1 Deploying QoS in a network 2 QoS processing flow in a device 2 Configuring

More information

Internetworking with Different QoS Mechanism Environments

Internetworking with Different QoS Mechanism Environments Internetworking with Different QoS Mechanism Environments ERICA BUSSIKI FIGUEIREDO, PAULO ROBERTO GUARDIEIRO Laboratory of Computer Networks, Faculty of Electrical Engineering Federal University of Uberlândia

More information

Implementation of Differentiated Services over ATM

Implementation of Differentiated Services over ATM Implementation of Differentiated s over ATM Torsten Braun, Arik Dasen, and Matthias Scheidegger; Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland Karl Jonas and Heinrich

More information

Analysis of Protocol Operations and Scalability of COPS-SLS Negotiation System

Analysis of Protocol Operations and Scalability of COPS-SLS Negotiation System Analysis of Protocol Operations and Scalability of COPS-SLS Negotiation System Thi Mai Trang Nguyen 1,2, Nadia Boukhatem 2, Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6, 8 rue du Capitaine Scott,

More information

4A0-107 Q&As. Alcatel-Lucent Quality of Service. Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee

4A0-107 Q&As. Alcatel-Lucent Quality of Service. Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee 4A0-107 Q&As Alcatel-Lucent Quality of Service Pass Alcatel-Lucent 4A0-107 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering

PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Computer Science & Engineering INTERNAL ASSESSMENT TEST 2 Date : 01/04/2015 Max Marks : 50 Subject & Code : Computer Networks-II/10CS64 Section : VI- A & VI-C Name of faculty : Ravi Dixit Time : 8:30-10:00am Note: Answer ALL Questions

More information

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73

Configuring global CAR 73 Overview 73 Configuring aggregate CAR 73 Configuration procedure 73 Configuration example 73 Contents QoS overview 1 Introduction to QoS 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 2 QoS techniques overview 2 Deploying QoS in a network 2 QoS processing flow

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

IP Premium Agenda. - Services specification and implementation discussion. - Qos Parameters. M. Campanella - TF-TNG - Münster 7 feb 2001

IP Premium Agenda. - Services specification and implementation discussion. - Qos Parameters. M. Campanella - TF-TNG - Münster 7 feb 2001 IP Premium Agenda - Services specification and implementation discussion - Qos Parameters 1 Géant QoS Services Specifications Mauro Campanella Tiziana Ferrari Mauro.Campanella@mi.infn.it Tiziana.Ferrari@cnaf.infn.it

More information

QUALITY OF SERVICE ARCHITECTURES APPLICABILITY IN AN INTRANET NETWORK

QUALITY OF SERVICE ARCHITECTURES APPLICABILITY IN AN INTRANET NETWORK Quality Of Service Architectures Applicability In An Intranet Network QUALITY OF SERVICE ARCHITECTURES APPLICABILITY IN AN INTRANET NETWORK Abstract Codruţ Mitroi 1 The quality of service (QoS) concept,

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2 1 Outline 1. Basics 2. Media Handling 3. Quality of Service (QoS) 2 Basics - Definitions - History - Standards.

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

Service Function Chaining. Intended status: Informational Expires: January 1, 2015 Peng He Ciena July 1, 2014

Service Function Chaining. Intended status: Informational Expires: January 1, 2015 Peng He Ciena July 1, 2014 Service Function Chaining Internet Draft Intended status: Informational Expires: January 1, 2015 C. Huang Carleton University Jiafeng Zhu Huawei Peng He Ciena July 1, 2014 SFC Use Cases on Recursive Service

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) What you will learn Techniques for QoS Integrated Service (IntServ) Differentiated Services (DiffServ) MPLS QoS Design Principles 1/49 QoS in the Internet Paradigm IP over everything

More information

Domain Based Approach for QoS Provisioning in Mobile IP

Domain Based Approach for QoS Provisioning in Mobile IP Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr

More information

Marking Traffic CHAPTER

Marking Traffic CHAPTER CHAPTER 7 To service the growing numbers of customers and their needs, service provider networks have become more complex and often include both Layer 2 and Layer 3 network devices. With this continued

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

Internet Engineering Task Force J. Sumimoto INTERNET-DRAFT NTT M. Carugi Expires June 2003 Networks (Coeditors) J. De.

Internet Engineering Task Force J. Sumimoto INTERNET-DRAFT NTT M. Carugi Expires June 2003 Networks (Coeditors) J. De. Internet Engineering Task Force J. Sumimoto INTERNET-DRAFT NTT M. Carugi Expires June 2003 Nortel Networks (Coeditors) Clercq Alcatel Nagarajan Sprint Suzuki J. De A. M. NTT December 27, Guidelines of

More information

Configuring Quality of Service

Configuring Quality of Service This chapter describes the Quality of Service and procedures to configure Quality of Service. Introduction to Quality of Service, page 1 CPT System QoS, page 4 Ingress QoS Functions, page 7 Egress QoS

More information

Satellites in Next Generation Networks QoS issues Stéphane Combes, R&D, Alcatel Space

Satellites in Next Generation Networks QoS issues Stéphane Combes, R&D, Alcatel Space Satellites in Next Generation s QoS issues Stéphane Combes, R&D, Alcatel Space ITU-T workshop on Satellites in IP and Multimedia Geneva, 9-11 December 2002 Content > What NGN and QoS mean? End-to-end QoS

More information

QoS Technology White Paper

QoS Technology White Paper QoS Technology White Paper Keywords: Traffic classification, congestion management, congestion avoidance, precedence, differentiated services Abstract: This document describes the QoS features and related

More information

Effect of Number of Drop Precedences in Assured Forwarding

Effect of Number of Drop Precedences in Assured Forwarding Internet Engineering Task Force Internet Draft Expires: January 2000 Mukul Goyal Arian Durresi Raj Jain Chunlei Liu The Ohio State University July, 999 Effect of Number of Drop Precedences in Assured Forwarding

More information

Quality-of-Service Option for Proxy Mobile IPv6

Quality-of-Service Option for Proxy Mobile IPv6 Internet Engineering Task Force (IETF) Request for Comments: 7222 Category: Standards Track ISSN: 2070-1721 M. Liebsch NEC P. Seite Orange H. Yokota KDDI Lab J. Korhonen Broadcom Communications S. Gundavelli

More information

Small Enterprise Design Profile(SEDP) WAN Design

Small Enterprise Design Profile(SEDP) WAN Design CHAPTER 3 Small Enterprise Design Profile(SEDP) WAN Design This chapter discusses how to design and deploy WAN architecture for Small Enterprise Design Profile. The primary components of the WAN architecture

More information

Implementing QoS in IP networks

Implementing QoS in IP networks Adam Przybyłek http://przybylek.wzr.pl University of Gdańsk, Department of Business Informatics Piaskowa 9, 81-824 Sopot, Poland Abstract With the increasing number of real-time Internet applications,

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

Operation Manual MPLS VLL. Table of Contents

Operation Manual MPLS VLL. Table of Contents Table of Contents Table of Contents... 1-1 1.1 MPLS VLL Overview... 1-2 1.1.1 Concepts in MPLS VLL... 1-2 1.1.2 Introduction to MPLS VLL... 1-2 1.1.3 Packet Forwarding... 1-3 1.1.4 Implementation... 1-4

More information

Maintaining Cisco Service Provider Quality of Service

Maintaining Cisco Service Provider Quality of Service 642-785 Maintaining Cisco Service Provider Quality of Service Version 13.20 QUESTION NO: 1 Which of these correctly describes traffic classification using qos group? A. qos-group marking is automatically

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012

MPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012 MPLS VPN over mgre Last Updated: November 1, 2012 The MPLS VPN over mgre feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity

More information

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time).

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time). Real-Time Applications Tolerant: can tolerate occasional loss of data. Intolerant: cannot tolerate such losses. Delay-adaptive: applications that can adjust their playback point (delay or advance over

More information

A Service-Centric IP Quality of Service Architecture for Next Generation Networks

A Service-Centric IP Quality of Service Architecture for Next Generation Networks A Service-Centric IP Quality of Service Architecture for Next Generation Networks D. Goderis, S. Van den Bosch, Y. T Joens Alcatel Network Strategy Group Fr. Wellesplein 1, 2018, Antwerpen, Belgium {Danny.Goderis,

More information

A New Policy Based Management of Mobile IP Users

A New Policy Based Management of Mobile IP Users A New Policy Based Management of Mobile IP Users Hakima Chaouchi and Guy Pujolle University of Paris VI, LIP6 networks Lab. 8 rue du capitaine Scott, 75015 Paris {Hakima.CHAOUCHI ; Guy.pujolle}@lip6.fr

More information

Converged Networks. Objectives. References

Converged Networks. Objectives. References Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture

More information

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal We all know Ethernet based on its long history as the LAN connectivity technology of choice. Recently,

More information

Supporting Differentiated Services in MPLS Networks

Supporting Differentiated Services in MPLS Networks Supporting Differentiated Services in MPLS Networks Ilias Andrikopoulos and George Pavlou Centre for Communication Systems Research (CCSR) University of Surrey Guildford, Surrey, GU2 5XH, UK Email: {I.Andrikopoulos,

More information

IP Network Emulation

IP Network Emulation Developing and Testing IP Products Under www.packetstorm.com 2017 PacketStorm Communications, Inc. PacketStorm is a trademark of PacketStorm Communications. Other brand and product names mentioned in this

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment

An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment Christos Bouras and Dimitris Primpas Research Academic Computer Technology

More information

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES

USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES USE OF THE NETWORK SIMULATOR NS-2 TOOL IN LECTURES Petr Berka, Petr Hujka Department of Telecommunications, Brno University of Technology, Purkynova 118, 612 00 Brno, Czech Republic, phone: +420 5 41149190,

More information

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge

More information

Functional Requirements 10/20/2003. IEEE Working Group on Mobile Broadband Wireless Access <

Functional Requirements 10/20/2003. IEEE Working Group on Mobile Broadband Wireless Access < Project IEEE 802.20 Working Group on Mobile Broadband Wireless Access Title France Telecom Service Provider Requirements for 802.20 Date Submitted Source(s) Re:

More information

THE Differentiated Services (DiffServ) architecture [1] has been

THE Differentiated Services (DiffServ) architecture [1] has been Efficient Resource Management for End-to-End QoS Guarantees in DiffServ Networks Spiridon Bakiras and Victor O.K. Li Department of Electrical & Electronic Engineering The University of Hong Kong Pokfulam

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information