One document matched: draft-baker-diffserv-basic-classes-02.txt

Differences from draft-baker-diffserv-basic-classes-01.txt



Non                                                             F. Baker
Internet-Draft                                             Cisco Systems
Expires: August 13, 2004                                      J. Babiarz
                                                                 K. Chan
                                                         Nortel Networks
                                                       February 13, 2004


         Configuration Guidelines for DiffServ Service Classes
                 draft-baker-diffserv-basic-classes-02

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that other
   groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at http://
   www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 13, 2004.

Copyright Notice

   Copyright (C) The Internet Society (2004). All Rights Reserved.

Abstract

   This paper summarizes the recommended correlation between service
   classes and their usage, with references to their corresponding
   recommended Differentiated Service Code Points (DSCP), traffic
   conditioners, Per-Hop Behaviors (PHB) and Active Queue Management
   (AQM) mechanisms. There is no intrinsic requirement that particular
   DSCPs, traffic conditioner PHBs and AQM be used for a certain service
   class, but as a policy it is useful that they be applied consistently
   across the network.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",



Baker, et al.           Expires August 13, 2004                 [Page 1]

Internet-Draft                  Document                   February 2004


   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [4].

Table of Contents

   1.      Introduction . . . . . . . . . . . . . . . . . . . . . . .  3
   1.1     Expected use in the Network  . . . . . . . . . . . . . . .  3
   1.2     Key Differentiated Services Concepts . . . . . . . . . . .  4
   1.2.1   Queuing  . . . . . . . . . . . . . . . . . . . . . . . . .  4
   1.2.1.1 Priority Queuing . . . . . . . . . . . . . . . . . . . . .  4
   1.2.1.2 Rate Queuing . . . . . . . . . . . . . . . . . . . . . . .  4
   1.2.2   Active Queue Management  . . . . . . . . . . . . . . . . .  5
   1.2.3   Traffic Conditioning . . . . . . . . . . . . . . . . . . .  5
   1.2.4   Differentiated Services Code Point (DSCP)  . . . . . . . .  6
   1.2.5   Per-Hop Behavior (PHB) . . . . . . . . . . . . . . . . . .  6
   1.3     Key Service Concepts . . . . . . . . . . . . . . . . . . .  6
   1.3.1   Default Forwarding (DF)  . . . . . . . . . . . . . . . . .  7
   1.3.2   Assured Forwarding (AF)  . . . . . . . . . . . . . . . . .  8
   1.3.3   Expedited Forwarding (EF)  . . . . . . . . . . . . . . . .  8
   1.3.4   Class Selector (CS)  . . . . . . . . . . . . . . . . . . .  9
   1.3.5   Admission Control  . . . . . . . . . . . . . . . . . . . .  9
   1.3.6   Service Differentiation  . . . . . . . . . . . . . . . . . 10
   2.      Traffic Categories and Service Classes . . . . . . . . . . 10
   2.1     Deployment Scenarios . . . . . . . . . . . . . . . . . . . 14
   2.2     Service Classes and Behavior Aggregates  . . . . . . . . . 16
   2.3     Issues with Aggregation  . . . . . . . . . . . . . . . . . 17
   3.      Network Control Traffic Category . . . . . . . . . . . . . 18
   3.1     Administrative Service Class . . . . . . . . . . . . . . . 18
   3.2     Network Control Service Class  . . . . . . . . . . . . . . 19
   4.      User Traffic Categories  . . . . . . . . . . . . . . . . . 21
   4.1     Interactive Traffic Category . . . . . . . . . . . . . . . 22
   4.1.1   Telephony Service Class  . . . . . . . . . . . . . . . . . 22
   4.1.2   Multimedia Conferencing Service Class  . . . . . . . . . . 24
   4.2     Responsive Traffic Category  . . . . . . . . . . . . . . . 26
   4.2.1   Multimedia Streaming Service Class . . . . . . . . . . . . 26
   4.2.2   Low Latency Data Service Class . . . . . . . . . . . . . . 29
   4.3     Timely Traffic Category  . . . . . . . . . . . . . . . . . 31
   4.3.1   High Throughput Data Service Class . . . . . . . . . . . . 31
   4.3.2   Standard Service Class . . . . . . . . . . . . . . . . . . 33
   4.4     Non Critical Traffic Catgegory . . . . . . . . . . . . . . 34
   4.4.1   Low Priority Data  . . . . . . . . . . . . . . . . . . . . 34
   5.      Mapping Applications to Service Classes  . . . . . . . . . 35
   6.      Security Considerations  . . . . . . . . . . . . . . . . . 36
   7.      Achnoledgements  . . . . . . . . . . . . . . . . . . . . . 36
           Normative References . . . . . . . . . . . . . . . . . . . 36
           Informative References . . . . . . . . . . . . . . . . . . 38
           Authors' Addresses . . . . . . . . . . . . . . . . . . . . 39
           Intellectual Property and Copyright Statements . . . . . . 40



Baker, et al.           Expires August 13, 2004                 [Page 2]

Internet-Draft                  Document                   February 2004


1. Introduction

   This paper summarizes the recommended correlation between service
   classes and their usage, with references to their corresponding
   recommended Differentiated Service Code Points (DSCP), traffic
   conditioners, Per-Hop Behaviors (PHB) and Active Queue Management
   (AQM) mechanisms. There is no intrinsic requirement that particular
   DSCPs, traffic conditioner PHBs and AQM be used for a certain service
   class, but as a policy it is useful that they be applied consistently
   across the network.

   Service classes are defined, based on the different traffic
   characteristics and required performance of the applications/
   services. This approach allows us to map current and future
   applications/services of similar traffic characteristic and
   performance requirements into the same service class. With this
   approach, a limited set of service classes is required. For
   completeness, we have defined nine different service classes, two for
   network operation/administration and seven for user/subscriber
   applications/services. However, we expect that network administrators
   will selectively choose the service classes that are required in
   their network based on their needs.

1.1 Expected use in the Network

   In the Internet today, corporate LANs and ISP WANs are generally not
   heavily utilized - they are commonly 10% utilized at most. For this
   reason, congestion, loss, and variation in delay within corporate
   LANs and ISP backbones is virtually unknown. This clashes with user
   perceptions, for three very good reasons.
   o  The industry moves through cycles of bandwidth boom and bandwidth
      bust, depending on prevailing market conditions and the periodic
      deployment of new bandwidth-hungry applications.
   o  In access networks, the state is often different. This may be
      because throughput rates are artificially limited, or are over
      subscribe, or because of access network design trade-offs.
   o  Other characteristics, such as database design on web servers
      (that may create contention points, e.g. in filestore), and
      configuration of firewalls and routers, often look externally like
      a bandwidth limitation.

   The intent of this document is to provide a consistent marking,
   conditioning and packet treatment strategy so that it can be
   configured and put into service on any link which itself is
   congested.






Baker, et al.           Expires August 13, 2004                 [Page 3]

Internet-Draft                  Document                   February 2004


1.2 Key Differentiated Services Concepts

   The reader must be familiar with the principles of the Differentiated
   Services Architecture RFC 2475 [9]. However, we recapitulate key
   concepts here to save searching.

1.2.1 Queuing

   A queue is a data structure that holds traffic that is awaiting
   transmission. The traffic may be delayed while in the queue, possibly
   due to lack of bandwidth, or because it is low in priority. There are
   a number of ways to implement a queue; in some of these, it is more
   natural to discuss "service classes in a queuing system" rather than
   "a set of queues and a scheduler". In the literature, as a result,
   the concepts are used somewhat interchangeably.

   A simple model of a queuing system, however, is a set of data
   structures for packet data, which we will call queues or service
   classes and a mechanism for selecting the next packet from among
   them, which we call a scheduler.

1.2.1.1 Priority Queuing

   A priority queuing system is a combination of a set of queues and a
   scheduler that empties them in priority sequence. When asked for a
   packet, the scheduler inspects the highest priority queue, and if
   there is data present returns a packet from that queue. Failing that,
   it inspects the next highest priority queue, and so on. A freeway
   onramp with a stoplight for one lane, but which allows vehicles in
   the high occupancy vehicle lane to pass, is an example of a priority
   queuing system; the high occupancy vehicle lane represents the
   "queue" having priority.

   In a priority queuing system, a packet in the highest priority queue
   will experience a readily calculated delay - it is proportional to
   the amount of data remaining to be serialized when the packet arrived
   plus the volume of the data already queued ahead of it in the same
   queue. The technical reason for using a priority queue relates
   exactly to this fact: it limits delay and variations in delay, and
   should be used for traffic which has that requirement.

   A priority queue or queuing system needs to support rate and burst
   size control mechanism(s) to provide starvation avoidance of lower
   priority queues.

1.2.1.2 Rate Queuing

   Similarly, a rate-based queuing system is a combination of a set of



Baker, et al.           Expires August 13, 2004                 [Page 4]

Internet-Draft                  Document                   February 2004


   queues and a scheduler that empties each at a specified rate. An
   example of a rate based queuing system is a road intersection with a
   stoplight - the stoplight acts as a scheduler, giving each lane a
   certain opportunity to pass traffic through the intersection.

   In a rate-based queuing system, such as WFQ or WRR, the delay that a
   packet in any given queue will experience is dependant on the
   parameters and occupancy of its queue and the parameters and
   occupancy of the queues it is competing with. A queue whose traffic
   arrival rate is much less than the rate at which it lets traffic
   depart will tend to be empty and packets in it will experience
   nominal delays. A queue whose traffic arrival rate approximates or
   exceeds its departure rate will tend to be not empty, and packets in
   it will experience greater delay. Such a scheduler can impose a
   minimum rate, a maximum rate, or both, on any queue it touches.

1.2.2 Active Queue Management

   "Active queue management" or AQM is a generic name for any of a
   variety of procedures that use packet dropping or marking to manage
   the depth of a queue. The canonical example of such a procedure is
   Random Early Detection, in that a queue is assigned a minimum and
   maximum threshold, and the queuing algorithm maintains a moving
   average of the queue depth. While the mean queue depth exceeds the
   maximum threshold, all arriving traffic is dropped. While the mean
   queue depth exceeds the minimum threshold but not the maximum
   threshold, a randomly selected subset of arriving traffic is marked
   or dropped. This marking or dropping of traffic is intended to
   communicate with the sending system, causing its congestion avoidance
   algorithms to kick in. As a result of this behavior, it is reasonable
   to expect that TCP's cyclic behavior is desynchronized, and the mean
   queue depth (and therefore delay) should normally approximate the
   minimum threshold.

   A variation of the algorithm is applied in Assured Forwarding [12],
   in that the behavior aggregate consists of traffic with multiple DSCP
   marks, which are intermingled in a common queue. Different minima and
   maxima are configured for the several DSCPs separately, such that
   traffic that exceeds a stated rate at ingress is more likely to be
   dropped or marked than traffic that is within its contracted rate.

1.2.3 Traffic Conditioning

   Additionally, at the first router in a network that a packet crosses,
   arriving traffic may be measured, and dropped or marked according to
   a policy, or perhaps shaped on network ingress as in  A Rate Adaptive
   Shaper for Differentiated Services [27]. This may be used to bias
   feedback loops, such as is done in Assured Forwarding [12], or to



Baker, et al.           Expires August 13, 2004                 [Page 5]

Internet-Draft                  Document                   February 2004


   limit the amount of traffic in a system, as is done in Expedited
   Forwarding [22]. Such measurement procedures are collectively
   referred to as "traffic conditioners". Two traffic conditioners that
   are used in deployment of differentiated services that use Assured
   Forwarding are the Two Rate Three Color Marker (trTCM) [14] and the
   Single Rate Three Color Marker (trTCM) [13].

   Two Rate Three Color Marker:
      The Two Rate Three Color Marker (trTCM) [14] meters an IP packet
      stream and marks its packets based on two rates, Peak Information
      Rate (PIR) and Committed Information Rate (CIR), and their
      associated burst sizes to be green, yellow, or red.  A packet is
      marked red if it exceeds the PIR.  Otherwise it is marked either
      yellow or green depending on whether it exceeds or doesn't exceed
      the CIR. The trTCM is use to enforce committed rate separately
      from Peak Information Rate.

   Single Rate Three Color Marker:
      The Single Rate Three Color Marker (srTCM) [13] meters an IP
      packet stream and marks its packets green, yellow, or red.
      Marking is based on a Committed Information Rate (CIR) and two
      associated burst sizes, a Committed Burst Size (CBS) and an Excess
      Burst Size (EBS).  A packet is marked green if it doesn't exceed
      the CBS, yellow if it does exceed the CBS, but not the EBS and red
      otherwise.  The srTCM is used to enforce the committed rate and
      burst length.

1.2.4 Differentiated Services Code Point (DSCP)

   The DSCP is a number in the range 0..63, that is placed into an IP
   packet to mark it according to the class of traffic it belongs in.
   Half of these values are earmarked for standardized services, and the
   other half of them are available for local definition.

1.2.5 Per-Hop Behavior (PHB)

   In the end, the mechanisms described above are combined to form a
   specified set of characteristics for handling different kinds of
   traffic, depending on the needs of the application. This document
   seeks to identify useful traffic aggregates and specify what PHB
   should be applied to them.

1.3 Key Service Concepts

   While Differentiated Services is a general architecture that may be
   used to implement a variety of services, three fundamental services
   have been defined and characterized for general use. These are basic
   service for elastic traffic, the Assured Forwarding service, and the



Baker, et al.           Expires August 13, 2004                 [Page 6]

Internet-Draft                  Document                   February 2004


   Expedited Forwarding service for real-time (inelastic) traffic.

   The terms "elastic" and "real-time" are defined in RFC 1633 [3]
   Section 3.1, as a way of understanding broad brush application
   requirements. This document should be reviewed to obtain a broad
   understanding of the issues in quality of service, just as RFC 2475
   [9] should be reviewed to understand the data plane architecture used
   in today's Internet.

   The definition of "service class" is, a description of the overall
   treatment of (or a subset of) a customer's traffic across a
   particular domain, across a set of interconnected DiffServ (DS)
   domains, or end-to-end. Service descriptions are covered by
   administrative policy and services are constructed by applying
   traffic conditioning to create behavior aggregates that experience a
   known PHB at each node within the DS domain. A service class provides
   the specified end-to-end behaviors in the network which will support
   one or more applications or a set of applications that have similar
   traffic characteristics and performance requirements. This concept
   allows grouping of applications of similar traffic characteristics
   and performance requirements into a common forwarding discipline
   called a "service class" that provides consistent behavior in the
   administered network. (Service class definition originates from RFC
   2474 [8] Section 2, definition of a service).

1.3.1 Default Forwarding (DF)

   The basic services applied to any class of traffic are those
   described in RFC 2475 [8] and RFC 2309 [7]. Best Effort service may
   be summarized as "I will accept your packets", with no further
   guarantees. Packets in transit may be lost, reordered, duplicated, or
   delayed at random. Generally, networks are engineered to limit this
   behavior, but changing traffic loads can push any network into such a
   state.

   Application traffic in the internet is expected to be "elastic" in
   nature. By this, we mean that the receiver will detect loss or
   variation in delay in the network and provide feedback such that the
   sender adjusts its transmission rate to approximate available
   capacity.

   For basic best effort service, a single DSCP value is provided to
   identify the traffic, a queue to store it, and active queue
   management to protect the network from it and to limit delays. The
   interesting thing is that by giving that queue a higher minimum rate
   than its measured arrival rate, we can effectively limit the
   deleterious effects of congestion on a given class of traffic,
   transferring them to another class that is perhaps better able to



Baker, et al.           Expires August 13, 2004                 [Page 7]

Internet-Draft                  Document                   February 2004


   absorb the impact or is considered to be of lower value to the
   network administration. So, for example, if it is important to
   service database exchange or transaction traffic in a timely fashion,
   isolating the traffic into a queue and giving it a relatively high
   minimum rate will accomplish that.

   Scavenger, or less than best effort RFC 3662 [23], service can also
   be provided, for applications with congestion avoidance capabilities
   and is considered to be of lower value to the network administrator
   than best effort traffic.

1.3.2 Assured Forwarding (AF)

   The Assured Forwarding RFC 2597 [12] service is explicitly modeled on
   Frame Relay's DE flag or ATM's CLP capability, and is intended for
   networks that offer average-rate SLAs (as FR and ATM networks do).
   This is an enhanced Best Effort service; traffic is expected to be
   "elastic" in nature. The receiver will detect loss or variation in
   delay in the network and provide feedback such that the sender
   adjusts its transmission rate to approximate available capacity.

   For such classes, multiple DSCP values are provided (two or three,
   perhaps more using local values) to identify the traffic, a common
   queue or class to store the aggregate and active queue management to
   protect the network from it and to limit delays. Traffic is metered
   as it enters the network, and traffic is variously marked depending
   on the arrival rate of the aggregate. The premise is that it is
   normal for users to occasionally use more capacity than their
   contract stipulates, perhaps up to some bound. However, if traffic
   must be lost or marked to manage the queue, this excess traffic will
   be marked or lost first.

1.3.3 Expedited Forwarding (EF)

   Expedited Forwarding RFC 3246 [22] was originally proposed as a way
   to implement a virtual wire, and can be used in such a manner. It is
   an enhanced best effort service: traffic remains subject to loss due
   to line errors and reordering during routing changes. However, using
   queuing techniques, the probability of delay or variation in delay is
   minimized. For this reason, it is generally used to carry voice and
   for transport of data information that requires "wire like" behavior
   through the IP network. Voice is an inelastic "real-time" application
   that sends packets at the rate the codec produces them, regardless of
   availability of capacity. As such, this service has the potential to
   disrupt or congest a network if not controlled. It also has the
   potential for abuse.

   To protect the network, at minimum one must police traffic at various



Baker, et al.           Expires August 13, 2004                 [Page 8]

Internet-Draft                  Document                   February 2004


   points to ensure that the design of a queue is not over-run, and then
   the traffic must be given a low delay queue (often using priority,
   although it is asserted that a rate-based queue can do this) to
   ensure that variation in delay is not an issue, to meet application
   needs.

1.3.4 Class Selector (CS)

   Class Selector provides support for historical codepoint definitions
   and PHB requirement. The Class Selector DS field provides a limited
   backward compatibility with legacy (pre DiffServ) practice, as
   described in RFC 2474 [8] Section 4. Backward compatibility is
   addressed in two ways.  First, there are per-hop behaviors that are
   already in widespread use (e.g. those satisfying the IPv4 Precedence
   queuing requirements specified in RFC 1812), and we wish to permit
   their continued use in DS-compliant networks. In addition, there are
   some codepoints that correspond to historical use of the IP
   Precedence field and we reserve these codepoints to map to PHBs that
   meet the general requirements specified in RFC 2474 [8]Section
   4.2.2.2.

   No attempt is made to maintain backward compatibility with the "DTR"
   or TOS bits of the IPv4 TOS octet, as defined in RFC 791 [1].

   A DS-compliant network can be deployed with a set of one or more
   Class Selector compliant PHB groups.  As well, network administrator
   may configure the network nodes to map codepoints to PHBs
   irrespective of bits 3-5 of the DSCP field to yield a network that is
   compatible with historical IP Precedence use. Thus, for example,
   codepoint '011000' would map to the same PHB as codepoint '011010'.

1.3.5 Admission Control

   Admission control including refusal when policy thresholds are
   crossed, can assure high quality communication by ensuring the
   availability of bandwidth to carry a load. Inelastic real-time flows
   like VoIP (telephony) or video conferencing services can benefit from
   use of admission control mechanism, as generally the telephony
   service is configured with over subscription, meaning that some
   user(s) may not be able to make a call during peak periods.

   For VoIP (telephony) service, a common approach is to use signaling
   protocols such as SIP, H.323, H.248, MEGACO, RSVP, etc. to negotiate
   admittance and use of network transport capabilities. When a user has
   been authorized to send voice traffic, this admission procedure has
   verified that data rates will be within the capacity of the network
   that it will use. Since RTP voice does not react to loss or marking
   in any substantive way, the network must police at ingress to ensure



Baker, et al.           Expires August 13, 2004                 [Page 9]

Internet-Draft                  Document                   February 2004


   that the voice traffic stays within its negotiated bounds. Having
   thus assured a predictable input rate, the network may use a priority
   queue to ensure nominal delay and variation in delay.

   Another approach that may be used in small and bandwidth constrained
   networks for limited number of flows is RSVP [5]RFC 2996 [16].
   However, there is concern with the scalability RFC 2206 [6]of this
   solution in large networks and aggregation RFC 3175 [18]of sessions
   is considered to be a requirement.

1.3.6 Service Differentiation

   There are practical limits on the level of service differentiation
   that should be offered in the IP networks. We believe we have defined
   a practical approach in delivering service differentiation by
   defining different service classes that networks may choose to
   support to provide the appropriated level of behaviors and
   performance needed by current and future applications and services.
   The defined structure for providing services allows several
   applications having similar traffic characteristics and performance
   requirements to be grouped into one service class and therefore
   forwarded by single queue in a router. Also we provide a method for
   different applications (flows) within a service class to have unique
   DSCP marking so that different conditioning and policing polices may
   be used for different flows, through the use of Class Selector (CS)
   codepoints or locally defined DSCP (EXP/LU) values and associating
   them with the standardized PHBs. This approach provides a lot of
   flexibility in providing the appropriate level of service
   differentiation for current and new yet unknown applications without
   introducing significant changes to routers or network configurations
   when new traffic type is added to the network.

2. Traffic Categories and Service Classes

   This document divides traffic into five categories, one for network
   control and four for user/subscriber traffic. The term "user" and
   "subscriber" are used interchangeable in this document. Network
   control traffic can further be divided into two service classes:
   "Administrative", for flows that are critical for stable operation of
   the network, requiring lower delay or higher probability of being
   serviced than normal "Network Control" flows.  User/subscriber
   traffic is broken down into four user traffic categories,
   interactive, responsive, timely and non-critical as defined by ITU-T
   Recommendation G.1010.  These four user traffic categories can
   further be subdivided into one or more different service classes
   within each traffic category to provide further behavior
   differentiation. End-to-end performance requirements for these
   traffic categories and service classes are further defined in ITU-T



Baker, et al.           Expires August 13, 2004                [Page 10]

Internet-Draft                  Document                   February 2004


   Recommendation Y.1541, Y.1540, G.1010 and new work currently underway
   in ITU-T. Additionally, network administrators may choose to define
   other service classes.

   The service classes define the required treatment for the traffic in
   order to meet user, application or network expectations.  Section 3
   in this document defines the service classes that MAY be used for
   forwarding network control traffic and Section 4 defines the service
   classes that MAY be used for forwarding user traffic with examples of
   intended application types mapped into each of their service classes.
   Note that the application types are only examples and are not meant
   to be all-inclusive or prescriptive.  Also it should be noted that
   the service class naming or ordering does not imply any priority
   ordering. They are simply reference names that are used in this
   document with associated QoS behaviors that are optimized for the
   particular application types they support. Network administrators MAY
   choose to assign different service class names, to the service
   classes that they will support.  Figure 1 defines the RECOMMENDED
   relationship between service classes and DS codepoint(s) assignment
   with application examples.































Baker, et al.           Expires August 13, 2004                [Page 11]

Internet-Draft                  Document                   February 2004


    ------------------------------------------------------------------
   |   Service     |  DSCP   |    DSCP     |       Application        |
   |  Class name   |  name   |    value    |        Examples          |
   |===============+=========+=============+==========================|
   |Administrative |  CS7    |   111000    | Heartbeats               |
   |---------------+---------+-------------+--------------------------|
   |Network Control|  CS6    |   110000    | Network routing          |
   |---------------+---------+-------------+--------------------------|
   | Telephony     | EF,CS5  |101010,101000| IP Telephony             |
   |---------------+---------+-------------+--------------------------|
   | Multimedia    |AF41,AF42|100010,100100| Video conferencing       |
   | Conferencing  |  AF43   |100110       | Interactive gaming       |
   |---------------+---------+-------------+--------------------------|
   | Multimedia    |AF31,AF32|011010,011100|Broadcast TV, Pay per view|
   | Streaming     |AF33, CS4|011110,100000|Video surveillance        |
   |---------------+---------+-------------+--------------------------|
   | Low Latency   |AF21,AF22|010010,010100|Client/server transactions|
   |   Data        |AF23, CS3|010110,011000|peer-to-peer signaling    |
   |---------------+---------+-------------+--------------------------|
   |High Throughput|AF11,AF12|001010,001100|Store&forward applications|
   |    Data       |AF13, CS2|001110,010000|Non-critcal OAM&P         |
   |---------------+---------+-------------+--------------------------|
   |    Standard   | DF,(CS0)|   000000    | Undifferentiated         |
   |               |         |             | applications             |
   |---------------+---------+-------------+--------------------------|
   | Low Priority  | CS1     |   001000    | Any flow that has no BW  |
   |     Data      |         |             | assurance                |
    ------------------------------------------------------------------

                Figure 1: DSCP to Service Class Mapping

   Note: The Class Selector 2,3 and 4 codepoints are aliases of AF11,
   AF21 and AF31 codepoints respectively. Class Selector 5 codepoint is
   alias of EF codepoint. Default Forwarding and Class Selector 0
   provide equivalent behavior and use the same DS codepoint.

   It is expected that network administrators will choose the service
   classes that they will support based on their need, starting off with
   two or three service classes for user traffic and adding others as
   the need arises.

   Figure 2 provides a summary of DiffServ QoS mechanisms that SHOULD be
   used for the nine different service classes that are further defined
   in Section 3 and 4 of this document. Based on what applications/
   services that need to be differentiated, network administrators can
   choose the service class(es) that need to be supported in their
   network.




Baker, et al.           Expires August 13, 2004                [Page 12]

Internet-Draft                  Document                   February 2004


    ------------------------------------------------------------------
   |  Service      | DSCP | Conditioning at   |   PHB   | Queuing| AQM|
   |   Class       |      |    DS Edge        |  Used   |        |    |
   |===============+======+===================+=========+========+====|
   |Administrative | CS7* |Police using sr+bs | RFC2474 |Priority| No |
   |---------------+------+-------------------+---------+--------+----|
   |Network Control| CS6  |Police using sr+bs | RFC2474 |  Rate  |Yes |
   |---------------+------+-------------------+---------+--------+----|
   | Telephony     |EF,CS5|Police using sr+bs | RFC3246 |Priority| No |
   |---------------+------+-------------------+---------+--------+----|
   |               | AF41 |                   |         |        | Yes|
   | Multimedia    | AF42 |  Using trTCM      | RFC2597 |  Rate  | per|
   | Conferencing  | AF43 |   (RFC2698)       |         |        |DSCP|
   |---------------+------+-------------------+---------+--------+----|
   |               | AF31 | Police using sr+bs|         |        |    |
   |               |------+-------------------|         |        | Yes|
   | Multimedia    | AF32 | Police sum using  |         |  Rate  | per|
   | Streaming     | AF33 |      sr+bs        | RFC2597 |        |DSCP|
   |               |------+-------------------|         |        |----|
   |               | CS4  |Police using sr+bs |         |        | No |
   |---------------+------+-------------------+---------+--------+----|
   |               | AF21 |                   |         |        | Yes|
   |    Low        | AF22 |  Using srTCM      |         |        | per|
   |   Latency     | AF23 |   (RFC 2697)      | RFC2597 |  Rate  |DSCP|
   |    Data       |------+-------------------|         |        |----|
   |               | CS3  |Police using sr+bs |         |        | No |
   |---------------+------+-------------------+---------+--------+----|
   |               | AF11 |                   |         |        | Yes|
   |    High       | AF12 |  Using srTCM      |         |        | per|
   |  Throughput   | AF13 |   (RFC 2697)      | RFC2597 |  Rate  |DSCP|
   |    Data       |------+-------------------|         |        |----|
   |               | CS2  |Police using sr+bs |         |        | No |
   |---------------+------+-------------------+---------+--------+----|
   |   Standard    | DF   | Not applicable    | RFC2474 |  Rate  | Yes|
   |---------------+------+-------------------+---------+--------+----|
   | Low Priority  | CS1  | Not applicable    | RFC3662 |  Rate  | Yes|
   |     Data      |      |                   |         |        |    |
    ------------------------------------------------------------------
   * Note: Administrative traffic is normally contained within a single
   administrated domain.

    Figure 2: Summary of QoS Mechanisms used for each Service Class

   Note: Conditioning at DS edge, means that traffic conditioning is
   performed at the edge of the DiffServ network were untrusted user
   devices are connected or between two DiffServ networks.

   Note: "sr+bs" represents a policing mechanism that provides single



Baker, et al.           Expires August 13, 2004                [Page 13]

Internet-Draft                  Document                   February 2004


   rate with burst size control.

2.1 Deployment Scenarios

   It is expected that network administrators will choose the service
   classes that they will support based on their need, starting off with
   two or three service classes for user traffic and adding others as
   the need arises. In this section we provide three examples of a
   subset of service classes that could be deployed.

   Example 1:

   A network administrator determines that they need in their network to
   provide three different levels of network performance (quality of
   service) for the services that they will be offering to their
   customers. They need to enable their network to provide:
   o  Reliable VoIP (telephony) service, equivalent to PSTN
   o  A low delay assured bandwidth data service
   o  As well, support current Internet services

   For this example, the network administrator's needs are addressed
   with the deployment of the following service classes:
   o  Network Control service class for routing and control traffic that
      is needed for reliable operation of the provider's network
   o  Standard service class for all traffic that will receive normal
      (undifferentiated) forwarding treatment through their network
   o  Telephony service class for VoIP (telephony) traffic
   o  Low Latency Data service class for the low delay assured bandwidth
      differentiated data service

   Figure 3, provides a popular industry view of the service
   differentiation supported in core network.



















Baker, et al.           Expires August 13, 2004                [Page 14]

Internet-Draft                  Document                   February 2004


    -----------------------------------------------------------------------
   |  Service      |  DSCP | Conditioning at   |   PHB   |        |        |
   |   Class       |       |    DS Edge        |  Used   | Queuing|  AQM   |
   |===============+=======+===================+=========+========+========|
   |               | CS7*  |                   |         |        | CS7=No |
   |Network Control| CS6   |Police using sr+bs | RFC2474 |  Rate  |CS6=Yes |
   |---------------+-------+-------------------+---------+--------+--------|
   | Telephony     |EF, CS5|Police using sr+bs | RFC3246 |Priority|  No    |
   |---------------+-------+-------------------+---------+--------+--------|
   |               | AF21  |                   |         |        |AF21=Yes|
   |    Low        | AF22  |  Using srTCM      |         |        |AF22=Yes|
   |   Latency     | AF23  |   (RFC 2697)      | RFC2597 |  Rate  |AF23=Yes|
   |    Data       |-------+-------------------|         |        |--------|
   |               | CS3   |Police using sr+bs |         |        | CS3=No |
   |---------------+-------+-------------------+---------+--------+--------|
   |   Standard    |DF(CS0)| Not applicable    | RFC2474 |  Rate  |  Yes   |
   |               | +other|                   |         |        |        |
    -----------------------------------------------------------------------
   * Note: Administrative traffic is normally contained within a single
   administrated domain.

              Figure 3: Popular Core Network Configuration

   Example 2:

   A network administrator determines that they need to support two
   service classes for control and administration of their network plus
   six levels of service differentiation for user traffic use the
   following service classes:
   o  Administrative
   o  Network Control
   o  Standard
   o  Telephony
   o  Low Latency Data
   o  High Throughput Data
   o  Multimedia Conferencing
   o  Multimedia Streaming

   Example 3:

   An enterprise network administrator determines that they need to
   provide seven levels of service differentiation for user traffic plus
   one for running of their network. They would configure their network
   to support the following service classes:
   o  Network Control
   o  Telephony
   o  Multimedia Streaming




Baker, et al.           Expires August 13, 2004                [Page 15]

Internet-Draft                  Document                   February 2004


   o  Multimedia Conferencing
   o  Low Latency Data
   o  High Throughput Data
   o  Standard
   o  Low Priority Data

2.2 Service Classes and Behavior Aggregates

   As stated earlier (Section 1.3) in this document, a service class
   defines the end-to-end performance and forwarding behavior required
   by application(s) and service(s) using them. However, network
   administrator that configure core network(s) that support high speed
   links (100 Mbps or higher) have the freedom of how they implement the
   different service classes including aggregating several service
   classes that they support into a signal Per-Hop Behavior (PHB) or Per
   Domain Behavior (PDB) defined in RFC 3086 [29], as long as the
   performance and traffic characteristic are met for all the aggregated
   service classes into the signal PDB.

   Figure 4, provides an example of how Telephony, Multimedia
   Conferencing and Multimedia Streaming service classes MAY be
   aggregated into a single PDB.

    ------------------------------------------------------------------
   |  Service   |  DSCP | Conditioning at  |   PHB  |        |        |
   |   Class    |       |    DS Edge       |  Used  | Queuing|  AQM   |
   |============+=======+==================+========+========+========|
   |  Network   | CS7*  |                  |        |        | CS7=No |
   |  Control   | CS6   |Police using sr+bs| RFC2474|  Rate  |CS6=Yes |
   |------------+-------+------------------+--------+--------+--------|
   | Telephony  |EF, CS5|Police using sr+bs|        |        |        |
   |------------+-------+------------------|        |        |        |
   |            | AF41  |                  |        |        |        |
   | Multimedia | AF42  |  Using trTCM     |        |        |        |
   |Conferencing| AF43  |   (RFC2698)      |        |        |  No    |
   |------------+-------+------------------| RFC3246|        |for all |
   |            | AF31  |Police using sr+bs|        |Priority|  DSCP  |
   |            |-------+------------------|        |        | mapped |
   | Multimedia | AF32  | Police sum using |        |        |into PHB|
   | Streaming  | AF33  |      sr+bs       |        |        |        |
   |            |-------+------------------|        |        |        |
   |            | CS4   |Police using sr+bs|        |        |        |
   |------------+-------+------------------+--------+--------+--------|
   |            | AF21  |                  |        |        |AF21=Yes|
   |    Low     | AF22  |  Using srTCM     |        |        |AF22=Yes|
   |   Latency  | AF23  |   (RFC 2697)     | RFC2597|  Rate  |AF23=Yes|
   |    Data    |-------+------------------|        |        |--------|
   |            | CS3   |Police using sr+bs|        |        | CS3=No |



Baker, et al.           Expires August 13, 2004                [Page 16]

Internet-Draft                  Document                   February 2004


   |------------+-------+------------------+--------+--------+--------|
   |            | AF1x  |                  |        |        |        |
   |  Standard  |DF(CS0)| Not applicable   | RFC2474|  Rate  |  Yes   |
   |            |CS2,CS1|                  |        |        |        |
    ------------------------------------------------------------------
   * Note: Administrative traffic is normally contained within a single
   administrated domain.

                 Figure 4: Aggregation in Core Network

   A network administrator configures a Per Domain Behavior (PDB) for
   real-time traffic that meets or exceeds the performance requirements
   and traffic characteristics of the aggregated service classes. For
   this example the PDB MUST be implemented using the EF PHB and all the
   traffic from the three aggregated service classes is forwarded using
   the EF PHB in this domain. Therefore there is no service
   differentiation between the individual aggregated service classes.

   Further, the network administrator MUST enforce a Service Level
   Agreement (SLA) for each service class that is aggregated into this
   PDB. The SLA for each service class SHOULD support the following
   parameters:
   o  DSCP marking
   o  Supported traffic rate
   o  Delay through network
   o  Delay variation or jitter
   o  Packet loss probability
   o  Plus, possibly other parameters

   Traffic entering the EF PDB MUST be measured and enforced so that:
   o  Sum of traffic in Telephony service class is less than rate "A"
      bps
   o  Sum of traffic in Multimedia Conferencing service class is less
      than rate "B" bps
   o  Sum of traffic in Multimedia Streaming service class is less than
      rate "C" bps

   The EF PDB MUST to be configured so that the sum of rates A, B and C
   is less than the forwarding bandwidth of this PDB. The experienced
   delay, jitter and packet loss limits will be the same for the
   aggregated service classes and the network configuration of the EF
   PDB MUST met or exceed the performance requirements of the most
   stringent SLA.

2.3 Issues with Aggregation

   When service classes are aggregation, the original individual service
   class behavior and performance requirements must not be violated.



Baker, et al.           Expires August 13, 2004                [Page 17]

Internet-Draft                  Document                   February 2004


   This is especially true for real-time traffic.  The PHB or PDB must
   be engineered so that the service rate is higher in comparison to the
   maximum packet rate of the individual service classes being
   aggregated so the smaller packets will not experience jitter outside
   of its tolerable range when large packets are being service by the
   same queue. Some of the impact of aggregating service classes can be
   minimized by performing careful admission control on each of the
   individual service class to make sure the impact of traffic of one
   service class (i.e. Multimedia Streaming of large packets) does not
   violate the behavior required by another service class (i.e.
   Telephone using small packets).

3. Network Control Traffic Category

   Network control traffic is defined as packet flows that are essential
   for stable operation of the administered network as well for
   information that may be exchanged between neighboring networks across
   a peering point where SLAs are in place. Network control traffic is
   different from user application control (signaling) that may be
   generated by some applications or services.  Network control traffic
   is mostly between routers and network nodes that are used for
   administering, controlling or managing the network segments and the
   services that are provided in that network segment. A network
   administrator MAY choose to split the network control traffic into
   two service classes i.e., Administrative and Network Control to
   provide two different forwarding treatments or just support one
   forwarding treatment for all network control flows.

3.1 Administrative Service Class

   The Administrative service class is intended to be used for control
   traffic that is within a single administrative network domain. If
   such traffic does not get through, the administered network domain
   may not function properly. Example of such type of traffic is
   heartbeats between core network switches/routers. Such heartbeats are
   used to determine if the next hop is reachable. If no heartbeat is
   received within a specified time interval, then the sending router
   assumes that the particular link or next hop node is unreachable on a
   particular interface and subsequently reroutes the traffic to a
   backup interface that can reach the next hop node.  This reroute is
   typically done in a time interval much shorter than the time it would
   take for the routing protocol to determine that the next hop node is
   unreachable.

   The Administrative service class if support MUST be configured using
   the DiffServ Class Selector (CS) PHB defined in  RFC 2474 [8] and
   MUST be configured to receive sufficient forwarding resources so that
   all packets are forwarded quickly.  The Administrative service class



Baker, et al.           Expires August 13, 2004                [Page 18]

Internet-Draft                  Document                   February 2004


   SHOULD be configured to use a Priority Queuing system such as defined
   in Section 1.2.1.1 of this document.

   The following protocols and application SHOULD use the Administrative
   service class:
   o  Network administrator's telnet sessions from secure and trusted
      terminals, Secure Shell (SSH)
   o  Protocol(s) that are transmitted between nodes within the
      administered network for detecting link and nodal failures
   o  Used for critical control traffic within an administrative domain

   The following protocols and application MUST NOT use the
   Administrative service class:
   o  User Traffic
   o  Inter-network domain (across peering points) control traffic

   Traffic characteristics of packet flows in the Administrative service
   class:
   o  Mostly messages between routers and network servers
   o  Typically small packet sizes, one packet at a time
   o  Packets requiring immediate forwarding
   o  User traffic is not allowed to use this service class

   RECOMMENDED DSCP marking is CS7 (Class Selector 7)

   RECOMMENDED Network Edge Conditioning:
   o  Drop or remark CS7 marked packets at ingress to DiffServ network
      domain
   o  Depending on policy within the administered network, CS7 marked
      packets MAY be dropped or remarked to CS6 at egress of DiffServ
      network or across peering points

3.2 Network Control Service Class

   The Network Control service class is used for transmitting packets
   between network devices (routers, servers, etc.) that require control
   information to be exchanged between different administrative domains
   (across a peering point) and for non-critical network control
   information exchange within one administrative domain. Traffic
   transmitted in this service class is very important as it keeps the
   network operational and MUST to be forwarded in a timely manner.

   The Network Control service class MUST be configured using the
   DiffServ Class Selector (CS) PHB defined in RFC 2474 [8]. This
   service class MUST be configured so that the traffic receives a
   minimum bandwidth guarantee, to ensure that the packets always
   receive timely service. The configured forwarding resources for
   Network Control service class SHOULD be such that the probability of



Baker, et al.           Expires August 13, 2004                [Page 19]

Internet-Draft                  Document                   February 2004


   packet drop under peak load is very low in this service class. The
   Network Control service class SHOULD be configured to use a Rate
   Queuing system such as defined in Section 1.2.1.2 of this document.

   The following protocols and application SHOULD use the Network
   Control service class:
   o  Routing packet flows, OSPF, BGP, ISIS, RIP
   o  Policy management flows between nodes in the network, COPS,
      RSVP-TE, etc.
   o  Signaling flows between high capacity telephony call servers or
      soft switches.  Such high capacity devices may control thousands
      of telephony (VoIP) calls
   o  Network services, DNS, DHCP, BootP, high priority OAM (SNMP) like
      alarms, etc.
   o  Control information exchange within and between different
      administrative domains across a peering point where SLAs are in
      place
   o  In 3GPP wireless solutions, UMTS Signaling/control information
      between wireless nodes

   The following protocols and applications MUST NOT use the Network
   Control service class:
   o  User traffic

   Traffic characteristics of packet flows in the Network Control
   service class:
   o  Mostly messages between routers and network servers
   o  Ranging from 50 to 1,500 byte packet sizes, normally one packet at
      a time but traffic can also burst (BGP)
   o  User traffic is not allowed to use this service class

   RECOMMENDED DSCP marking is CS6 (Class Selector 6)

   RECOMMENDED Network Edge Conditioning:
   o  At peering points (between two DiffServ networks) where SLAs are
      in place, CS6 marked packets are policed using a single rate with
      burst size (sr+bs) token bucket policer to keep the CS6 marked
      packet flows to within the traffic rate specified in the SLA
   o  CS6 marked packet flows from untrusted sources (for example, end
      user devices) are dropped or remarked at ingress to DiffServ
      network. Packets from users are not permitted access to the
      Network Control or Administrative service classes

   The fundamental service offered to the Network Control service class
   is enhanced best effort service with high bandwidth assurance. Since
   this service class is used to forward both elastic and inelastic
   flows, the service SHOULD be engineered so the  Active Queue
   Management [7] is applied to CS6 marked packets.



Baker, et al.           Expires August 13, 2004                [Page 20]

Internet-Draft                  Document                   February 2004


   If Administrative service class is not supported, then the Network
   Control service class MUST be used for both normal network control
   traffic and network administrative traffic defined in this document.
   Packets marked with CS7 DSCP use the same Per-Hop Behavior (PHB) as
   CS6 marked packets however, packets marked with CS7 DSCP MUST NOT be
   put through Active Queue Management (AQM).

4. User Traffic Categories

   User traffic is divided into four different categories, namely,
   interactive, responsive, timely and non-critical. An example of
   interactive traffic is traffic between two humans that is most
   sensitive to delay, loss and jitter; another example of interactive
   traffic is traffic between two servers where very low delay and loss
   are needed. Responsive traffic is typically between a human and a
   server but can also be between two servers; it is less affected by
   jitter and can tolerate longer delays than interactive traffic.
   Timely traffic is typically between two servers but can also be
   between a server and a human; the delay tolerance is significantly
   longer than for responsive traffic. Non-critical traffic is normally
   between servers where delivery may be delayed for period of time. The
   four traffic categories follow methodology defined by ITU-T
   Recommendation G.1010. End-to-end performance requirements for the
   listed service classes are currently being defined in ITU-T.

   Network administrators can categorize their applications based on the
   type of behavior that they require.  Figure 1 provides some common
   applications and the forwarding service class that best supports them
   based on their performance requirements.

   In summary:
   o  Telephony service class is best suited for applications that
      require very low delay and are of constant rate, such as IP
      telephony (VoIP) and circuit emulation over IP applications.
   o  Multimedia Conferencing service class is best suited for
      applications that require very low delay but are of variable rate,
      such as video conferencing and interactive gaming.
   o  Multimedia Streaming service class is best suited for streaming
      media applications where a human is waiting for outputs, such as
      broadcast TV, pay-per-view, video surveillance and security, etc.
   o  Low Latency Data service class is best suited for data processing
      applications where a human is waiting for outputs, such as
      web-based ordering, EPR application, peer-to-peer signaling, etc.
   o  High Throughput Data service class is best suited for store and
      forward applications such as FTP, billing record transfer, etc.
   o  Standard service class is for traffic that has not been identified
      as requiring differentiated treatment and is normally referred as
      best effort.



Baker, et al.           Expires August 13, 2004                [Page 21]

Internet-Draft                  Document                   February 2004


   o  Low Priority Data service class is intended for packet flows where
      bandwidth assurance is not required.

   Note, a network administrator MAY choose to support all or subsets of
   the defined service classes and provide service differentiation only
   to the applications/services that are mapped into them.

4.1 Interactive Traffic Category

   Interactive traffic category can be further split into two service
   classes, Telephony and Multimedia Conferencing to provide
   differentiation based on the different behavior of source traffic
   being forwarded.

4.1.1 Telephony Service Class

   The Telephony service class is RECOMMENDED for applications that
   require real-time, very low delay, very low jitter and very low
   packet loss for relatively constant-rate traffic sources (inelastic
   traffic sources). This service class MUST be used for IP telephony
   services.

   The fundamental service offered to traffic in the Telephony service
   class is a higher priority service than best-effort up to a specified
   upper bound with very low delay and very low packet loss. Operation
   is in some respect similar to an ATM CBR service, which has
   guaranteed bandwidth and which, if it stays within the negotiated
   rate, experiences nominal delay and no loss. The EF PHB has a similar
   guarantee.

   Typical configurations negotiate the setup of telephone calls over IP
   using protocols such as H.248, MEGACO, H.323 or SIP.  When a user has
   been authorized to send telephony traffic, the call admission
   procedure should have verified that the newly admitted data rates
   will be within the capacity of the Telephony service class forwarding
   capability in the network that it will use. For VoIP (telephony)
   service, call admission control is usually performed by a telephony
   call server/gatekeeper using signaling (SIP, H.323, H.248, MEGACO,
   etc.) on access points to the network. The bandwidth in the core
   network and the number of simultaneous VoIP sessions that can be
   supported needs to be engineered and controlled so that there is no
   congestion for this service. Since RTP telephony flows do not react
   to loss or substantial delay in any substantive way, the Telephony
   service class SHOULD forward packet as soon as possible.

   The Telephony service class MUST use Expedited Forwarding (EF) PHB as
   defined in RFC 3246 [22] and MUST be configured to receive guaranteed
   forwarding resources so that all packets are forwarded quickly. The



Baker, et al.           Expires August 13, 2004                [Page 22]

Internet-Draft                  Document                   February 2004


   Telephony service class MUST be configured to use a Priority Queuing
   system such as defined in Section 1.2.1.1 of this document.

   The following application SHOULD use the Telephony service class:
   o  VoIP (G.711, G.729 and other codecs)
   o  Telephony (trunk and/or stimulus) signaling between end device
      (terminals/gateways) and the call server (H.248, MEGACO)
   o  Voice-band data over IP (modem, fax)
   o  T.38 fax over IP
   o  Circuit emulation over IP, virtual wire, etc.
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Conversational Traffic Class

   Traffic characteristics:
   o  Mostly fixed size packets for VoIP (60, 70, 120 or 200 bytes in
      size)
   o  Packets emitted at constant time intervals
   o  Admission control of new flows is provided by telephony call
      server, media gateway, gatekeeper, edge router or access node that
      provides "middlebox" function.

   RECOMMENDED DSCP marking is EF for the following applications:
   o  VoIP (G.711, G.729 and other codecs)
   o  Voice-band data over IP (modem)
   o  Circuit emulation over IP, virtual wire, etc.
   o  Conversational UMTS Traffic Class

   RECOMMENDED DSCP marking is CS5 for the following applications:
   o  Telephony (trunk and/or stimulus) signaling between end device
      (terminals/gateways) and the call server (H.248, MEGACO)
   o  T.38 fax over IP

   Both EF and CS5 DS codepoints SHOULD be mapped into the Telephony
   service class and SHOULD used the Expedited Forwarding (EF) PHB. The
   CS5 DS codepoint is aliased to the EF codepoint and packets marked
   with CS5 are forwarded using the EF PHB.

   RECOMMENDED Network Edge Conditioning:
   o  Packet flows from untrusted sources (end user devices) MUST be
      policed at ingress to DiffServ network using single rate with
      burst size token bucket policer to ensure that the telephony
      traffic stays within its negotiated bounds.
   o  Packet flows from trusted sources (media gateways inside
      administered network) do not require policing.
   o  Policing of Telephony packet flows across peering points where SLA
      is in place is not required as telephony traffic will be
      controlled by admission control mechanism between peering points.




Baker, et al.           Expires August 13, 2004                [Page 23]

Internet-Draft                  Document                   February 2004


   Note: On low speed links (typically access links below 1 Mbps), in
   the attempt to minimize jitter/delay, it is RECOMMENDED that
   packetized audio streams are separated from processed telephony data
   information flows like T.38 fax and telephony signaling and forwarded
   using less stringent (from delay/jitter perspective) service class.
   PCM voice when compressed produces very small packets (perhaps 60
   bytes in size) where T.38 fax and signaling packets can be much
   bigger. The serialization delay and therefore delay/jitter, for the
   larger T.38 fax and signaling packets can be significantly bigger
   over low speed links then for 60 byte voice packets. For this reason
   it is RECOMMENDED for low speed links that packetized voice packets
   receive a higher priority forwarding treatment then the less
   sensitive from delay/jitter perspective T.38 fax and telephony
   signaling packets. PCM audio streams (voice) have a strict end-to-end
   delay constrain and SHOULD use Priority Queuing system whereas T.38
   fax or telephony signaling have a more liberal jitter/delay constrain
   and SHOULD use a Rate Queuing system on access links below 1 Mbps.

   On higher speed links the difference in serialization delay is very
   small, so both types of telephony packet flows are aggregated in to a
   single forwarding service class to simplify network engineering and
   use a Priority Queuing system. Moreover, the forwarding of voice
   packets and signaling packets with the same very low delay forwarding
   service class minimizes delay as well as the difference in delay
   between signaling and bearer path, thereby virtually eliminating
   speech clipping and ring-clipping problems at start of a call when
   interfacing to PSTN.

4.1.2 Multimedia Conferencing Service Class

   The Multimedia Conferencing service class is RECOMMENDED for
   applications that requires real-time and low delay for variable rate
   elastic traffic sources. Video conferencing is such an application.
   The traffic sources (applications) in this traffic class have the
   capability to change their emission rate based on feedback received
   from the receiving end. Detection of packet loss by the receiver is
   sent using the applications control stream to the transmitter as an
   indication of possible congestion; the transmitter then selects a
   lower transmission rate based on pre-configured encoding rates (or
   transmission rates).

   Typical video conferencing configurations negotiate the setup of
   multimedia session using protocols such as H.323 or SIP.  When a
   user/end-point has been authorized to start a multimedia session the
   admission procedure should have verified that the newly admitted data
   rates will be within the engineered capacity of the Multimedia
   Conferencing service class. The bandwidth in the core network and the
   number of simultaneous video conferencing sessions that can be



Baker, et al.           Expires August 13, 2004                [Page 24]

Internet-Draft                  Document                   February 2004


   supported SHOULD to be engineered to control traffic load for this
   service.

   The Multimedia Conferencing service class SHOULD use the Assured
   Forwarding (AF) PHB defined in RFC 2597 [12]. This service class
   SHOULD be configured to provide a bandwidth assurance for AF41, AF42,
   and AF43 marked packets to ensure that they get forwarded. The
   Multimedia Conferencing service class SHOULD be configured to use a
   Rate Queuing system such as defined in Section 1.2.1.2 of this
   document.

   The following application SHOULD use the Multimedia Conferencing
   service class:
   o  Video conferencing (interactive video)
   o  Interactive gaming
   o  Server to server data transfer requiring very low delay
   o  IP VPN service that specifies two rates and mean network delay
      that is slightly longer then network propagation delay.
   o  Interactive, time critical and mission critical applications.
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Interactive Traffic Class with Traffic Handling Priority 1
      (THP=1).

   Traffic characteristics:
   o  Variable size packets (50 to 1500 bytes in size)
   o  Higher the rate, higher is the density of large packets
   o  Variable packet emission time
   o  Source is capable of reducing its transmission rate based on
      detection of packet loss at the receiver

   RECOMMENDED DSCP marking:
   o  Interactive gaming packets are marked with AF41
   o  Video conferencing packets are marked with AF4x
   o  VPN service may be marked with AF4x, depending on the service
      characteristics
   o  Server to server data transfer with AF4x, depending on the service
      characteristics
   o  UMTS Interactive THP=1 packets are marked with AF4x

   Packet flows from video conferencing equipment MAY be marked at
   source by the video conferencing equipment or by the edge router
   using a Two Rate Three Color Marker (trTCM) RFC 2698 [14].

   RECOMMENDED DSCP marking when performed by video conferencing
   equipment:
   o  AF41 = H.323 video conferencing audio stream RTP/UDP
   o  AF41 = H.323 video conferencing video control RTCP/TCP




Baker, et al.           Expires August 13, 2004                [Page 25]

Internet-Draft                  Document                   February 2004


   o  AF41 = H.323 video conferencing video stream below specified rate
      "A"
   o  AF42 = H.323 video conferencing video stream between specified
      rate "A" and "B"
   o  AF43 = H.323 video conferencing video stream above specified rate
      "B"
   o  Where rate "B" is greater in magnitude than rate "A"

   RECOMMENDED Conditioning Performed at DiffServ Network Edge:
      The Two Rate Three Color Marker (trTCM) SHOULD be used as
      specified in RFC 2698 [14].
      If packets are marked by the sources or previous DiffServ domain,
      then the trTCM SHOULD be configured to operate in Color-Aware
      mode.
      If the packets are not marked by the source or previous DiffServ
      domain, then the trTCM MUST be configured to operate in
      Color-Blind mode.

   The fundamental service offered to "Multimedia Conferencing" traffic
   is enhanced best effort service with controlled rate and delay. Some
   traffic in this service class may not respond dynamically to packet
   loss. For video conferencing service, typically a 1% packet loss
   detected at the receiver triggers an encoding rate change, dropping
   to next lower provisioned video encoding rate. As such, Active Queue
   Management [7] SHOULD be used primarily to switch video encoding rate
   under congestion, changing from high rate to lower rate i.e. 1472
   kbps to 768 kbps. The probability of loss of AF41 traffic MUST NOT
   exceed the probability of loss of AF42 traffic, which in turn MUST
   NOT exceed the probability of loss of AF43 traffic.

4.2 Responsive Traffic Category

   Responsive traffic category can be further split into two service
   classes, Multimedia Streaming and Low Latency Data to provide
   differentiation based on the different behavior of source traffic
   being forwarded.

4.2.1 Multimedia Streaming Service Class

   The Multimedia Streaming service class is RECOMMENDED for
   applications that require near-real-time packet forwarding of
   variable rate traffic sources that are not as delay sensitive as
   applications using the Multimedia Conferencing service class.  Such
   applications include broadcast TV, streaming audio and video, video
   (movies) on demand and surveillance video.  In general, the
   Multimedia Streaming service class assumes that the traffic is
   buffered at the source/destination and therefore, is less sensitive
   to delay and jitter.



Baker, et al.           Expires August 13, 2004                [Page 26]

Internet-Draft                  Document                   February 2004


   The Streaming service class SHOULD use the Assured Forwarding (AF)
   PHB defined in RFC 2597 [12]. This service class SHOULD be configured
   to provide a minimum bandwidth assurance for AF31, AF32, AF33 and CS4
   marked packets to ensure that they get forwarded. The Streaming
   service class SHOULD be configured to use Rate Queuing system such as
   defined in Section 1.2.1.2 of this document.

   The following applications SHOULD use the Multimedia Streaming
   service class:
   o  Video surveillance and security (unicast)
   o  TV broadcast including HDTV (multicast)
   o  Pay per view movies and events (pre scheduled)
   o  Video on demand (unicast) with control (virtual DVD)
   o  Streaming audio (unicast)
   o  Streaming video (unicast)
   o  Web casts
   o  VPN service that supports different levels of flow assurance
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Streaming Traffic Class

   Traffic characteristics:
   o  Variable size packets (50 to 4196 bytes in size)
   o  Higher the rate, higher density of large packets
   o  Variable packet emission rate
   o  Some bursting at start of flow from some applications
   o  At about 2% packet loss, a video session is usually terminated

   Both the AF3x and CS4 DS codepoints SHOULD be mapped into the
   Multimedia Streaming service classes and used the Assured Forwarding
   (AF) PHB. The CS4 DS codepoint is aliases to the AF31 DS codepoint
   and packets marked with CS4 are forwarded using the AF31 PHB.
   However, Active Queue Management (AQM) MUST NOT be applied in the
   router(s) to CS4 market packets.

   Applications or end systems SHOULD pre-mark their packets with DSCP
   values as shown in Figure 5. If a host is unable to pre-mark their
   packets, then marking MUST be performed in the DiffServ edge router
   using MF classification. Due to the nature of the service, it is
   RECOMMENDED that video surveillance and security flows are marked
   with a different DSCP value so that traffic conditioning and policing
   policies can be different from other flows in the Multimedia
   Streaming service class.









Baker, et al.           Expires August 13, 2004                [Page 27]

Internet-Draft                  Document                   February 2004


       ------------------------------------------------------------------
      |    Applications                    |        Protocol        |DSCP|
      |------------------------------------+------------------------+----|
      |Video surveillance and security     |For RTP/UDP payload and |CS4 |
      | (unicast)                          |RTSP/TCP control streams|    |
      |------------------------------------+------------------------+----|
      |TV broadcast (multicast), pay per   |For RTP/UDP payloads and|    |
      |view movies and events (multicast)  |RTSP/TCP control streams|AF31|
      |Video on demand(unicast)with control|                        |    |
      |------------------------------------+------------------------+----|
      |                                    | For RTP/UDP streams    |AF33|
      |                                    |------------------------+----|
      | Video clips (unicast), premium WEB | For RTP/TCP streams    |AF32|
      |  casts, etc.                       |------------------------+----|
      |                                    | RTP/TCP or HTTP control|AF32|
      |------------------------------------+------------------------+----|
      |                                    | For RTP/UDP streams    |AF33|
      |                                    |------------------------+----|
      |  Audio streaming (unicast)         | For RTP/TCP streams    |AF32|
      |                                    |------------------------+----|
      |                                    |RTSP/TCP or HTTP control|AF31|
      |------------------------------------+------------------------+----|
      | VPN service that support different |                        |AF31|
      |  levels of assurance               |Implementation dependent|AF32|
      |                                    |                        |AF33|
      |------------------------------------+------------------------+----|
      |                                    |                        |AF31|
      | UMTS Streaming packets             | GPRS tunnel over IP    |AF32|
      |                                    |                        |AF33|
       ------------------------------------------------------------------

            Figure 5: DSCP marking for Multimedia Streaming

   RECOMMENDED Network Edge Conditioning:
      Packet flows from untrusted sources MUST be policed at the
      DiffServ network edge using single rate policers with a burst size
      control for AF31, AF32, AF33 and CS4 marked packets. Policing
      policy is based on the SLA for supported application(s). For the
      above defined applications, three single rate policers with burst
      size control SHOULD be provided; one for CS4 marked packets,
      another for AF31 marked packets and the third policer for AF32 and
      AF33 marked packets. Packet flows from trusted sources (e.g., TV
      broadcast servers) normally do not require policing.

   The fundamental service offered to "Multimedia Streaming" traffic is
   enhanced best effort service with controlled rate and delay. This
   traffic does not respond dynamically to packet loss. Packets marked
   with AF31 and CS4 DSCP require very high assurance of delivery.



Baker, et al.           Expires August 13, 2004                [Page 28]

Internet-Draft                  Document                   February 2004


   Packets marked with AF32 and AF33 can generally tolerated up to 1%
   and 2% packet loss respectively. As such, Active Queue Management [7]
   SHOULD be used primarily to reduce the number of flows at congestion
   points by dropping packets from less important flows first before any
   AF31 and CS4 marked packets are dropped. The service SHOULD be
   provisioned so that AF31 and CS4 marked packet flows have high
   assurance for bandwidth in the network. The probability of loss of
   AF31 traffic MUST NOT exceed the probability of loss of AF32 traffic,
   which in turn MUST NOT exceed the probability of loss of AF33.

   Packets marked with CS4 DSCP (Video surveillance and security
   packets) SHOULD NOT be put through Active Queue Management function.

4.2.2 Low Latency Data Service Class

   The Low Latency Data service class is RECOMMENDED for elastic and
   responsive typically client/server based applications.  Applications
   forwarded by this service class are those requiring a relatively fast
   responses and typically have asymmetrical bandwidth need, i.e. the
   client typically sends a short message to the server and the server
   responds with a much larger data flow back to the client.  The most
   common example of this is when a user clicks a hyperlink (~few dozen
   bytes) on a web page resulting in a new web page to be loaded (Kbytes
   of data). This service class is configured to provide good response
   for TCP [3] short lived flows that require real-time packet
   forwarding of variable rate traffic sources.

   The Low Latency Data service class MUST use the Assured Forwarding
   (AF) PHB defined in RFC 2597 [12]. This service class SHOULD be
   configured to provide a minimum bandwidth assurance for AF21, AF22,
   AF23 and CS3 marked packets to ensure that they get forwarded. The
   Low Latency Data service class MUST be configured to use a Rate
   Queuing system such as defined in Section 1.2.1.2 of this document.

   The following applications SHOULD use the Low Latency Data service
   class:
   o  Client/server applications
   o  SNA terminal to host transactions (SNA over IP using DLSw)
   o  Web based transactions (E-commerce)
   o  Credit card transactions
   o  Financial wire transfers
   o  ERP applications (e.g., SAP/BaaN)
   o  Peer-to-peer signaling (SIP, H.323)
   o  VPN service that supports CIR (Committed Information Rate) with up
      to two burst sizes
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Interactive Traffic Class with Traffic Handling Priority 2
      (THP=2)



Baker, et al.           Expires August 13, 2004                [Page 29]

Internet-Draft                  Document                   February 2004


   Traffic characteristics:
   o  Variable size packets (50 to 1500 bytes in size)
   o  Variable packet emission rate
   o  With packet bursts of TCP window size
   o  Source capable of reducing its transmission rate based on
      detection of packet loss at the receiver or through explicit
      congestion notification

   Both the AF2x and CS3 DS codepoints SHOULD be mapped into the Low
   Latency Data service classes and use the Assured Forwarding (AF) PHB.
   However, Active Queue Management (AQM) MUST NOT be applied in
   router(s) to CS3 market packets.

   RECOMMENDED DSCP marking:
   o  Peer-to-peer inelastic SIP, H.323 signaling packet flows are
      marked with CS3
   o  Elastic TCP flows are marked with AF2x
   o  VPN service may be marked with AF2x or CS3 depending on the
      service characteristics
   o  UMTS Interactive THP=2 packets are marked with AF2x

   Marking of the DSCP MAY be performed by a host or by an edge router.

   RECOMMENDED Conditioning Performed at the DiffServ Network Edge:
      Conditioning MAY be performed on per-flow or on aggregated-flows
      depending on the configuration and service offered. Metering and
      (re)marking of flows is REQUIRED at DiffServ edge nodes and at
      DiffServ boundary nodes.  The Low Latency Data service class
      SHOULD use a Single Rate Three Color Marker (srTCM) conditioner
      for AF2x flows.

   RECOMMENDED Conditioning Requirements for AF2x marked packets:
   o  Conditioning of aggregated packet flows destined for the Low
      Latency Data service class MUST be performed at the DiffServ edge
      of the network. Furthermore, conditioning SHOULD be performed
      using Single Rate Three Color Marker (srTCM) as defined in RFC
      2697 [13].
   o  If the packets are not pre-marked then the srTCM MUST be
      configured to operate in the Color-Blind mode.
   o  If the packets are pre-marked by the source or previous network
      (boundary node) then the srTCM SHOULD be configured to operate in
      the Color-Aware mode.

   RECOMMENDED Conditioning Requirements for CS3 marked packets:
   o  DiffServ edge and boundary nodes MUST police CS3 marked packets so
      both rate and burst size can be enforced.

   The fundamental service offered to "Low Latency Data" traffic is



Baker, et al.           Expires August 13, 2004                [Page 30]

Internet-Draft                  Document                   February 2004


   enhanced best effort service with controlled rate and delay. The
   service SHOULD be engineered so that AF21 and CS3 marked packet flows
   have sufficient bandwidth in the network to provide high assurance of
   delivery. Since the AF2x traffic is elastic and responds dynamically
   to packet loss, Active Queue Management [7] SHOULD be used primarily
   to control TCP flow rates at congestion points by dropping packet
   from TCP flows where the burst length is high. The probability of
   loss of AF21 traffic MUST NOT exceed the probability of loss of AF22
   traffic, which in turn MUST NOT exceed the probability of loss of
   AF23. Active queue management MAY also be implemented using Explicit
   Congestion Notification (ECN) RFC 3168 [17].

   Packets marked with CS3 DSCP (SIP signaling packets) MUST NOT be put
   through Active Queue Management [7] function.

4.3 Timely Traffic Category

   Timely traffic category can be further split into two service
   classes, High Throughput Data and Standard to provide differentiation
   based on the different behavior of source traffic being forwarded.

4.3.1 High Throughput Data Service Class

   The High Throughput Data service class is RECOMMENDED for elastic
   applications that require timely packet forwarding of variable rate
   traffic sources and more specifically is configured to provide good
   throughput for TCP longer lived flows. TCP [3] or a transport with a
   consistent Congestion Avoidance Procedure [10][11] normally will
   drive as high a data rate as it can obtain over a long period of
   time. The FTP protocol is a common example, although one cannot
   definitively say that all FTP transfers are moving data in bulk.

   The High Throughput Data service class MUST use the Assured
   Forwarding (AF) PHB defined in RFC 2597 [12]. This service class
   SHOULD be configured to provide a minimum bandwidth assurance for
   AF11, AF12, AF13 and CS2 marked packets to ensure that they are
   forwarded. The High Throughput Data service class MUST be configured
   to use a Rate Queuing system such as defined in Section 1.2.1.2 of
   this document.

   The following applications SHOULD use the High Throughput Data
   service class:
   o  Store and forward applications
   o  File transfer applications
   o  Email
   o  Non-critical OAM&P (Operation and Management and Provisioning)
      using SNMP, XML, etc.




Baker, et al.           Expires August 13, 2004                [Page 31]

Internet-Draft                  Document                   February 2004


   o  VPN service that supports CIR (Committed Information Rate) with up
      to two burst sizes
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Interactive Traffic Class with Traffic Handling Priority 3
      (THP=3)

   Traffic characteristics:
   o  Variable size packets (50 to 1500 bytes in size)
   o  Variable packet emission rate
   o  With packet bursts of TCP window size
   o  Source capable of reducing its transmission rate based on
      detection of packet loss at the receiver or through explicit
      congestion notification

   Both the AF1x and CS2 DS codepoints SHOULD be mapped into the High
   Throughput Data service classes and use the Assured Forwarding (AF)
   PHB. However, Active Queue Management (AQM) MUST NOT be applied in
   router(s) to CS2 marked packets.

   RECOMMENDED DSCP marking:
   o  Non-critical OAM&P (SNMP, XML, etc.) packets are marked with CS2
   o  Elastic TCP flows are marked with AF1x
   o  VPN service may be marked with AF1x or CS2 depending on the
      service characteristics
   o  UMTS Interactive THP=3 packets are marked with AF1x

   Note: Since the performance requirements for non-critical OAM&P
   traffic can be met with the High Throughput Data service class and
   the amount of non-critical OAM&P traffic is normally very small, we
   recommend that non-critical OAM&P traffic be marked with CS2 DSCP and
   forwarded using the High Throughput Data service class. The marking
   of non-critical OAM&P traffic with CS2 DS codepoint is recommended so
   that different conditioning, policing and queue management policies
   can be used for non-critical OAM&P.

   Marking of the DSCP MAY be performed by a host or by an edge router.

   RECOMMENDED Conditioning Performed at the DiffServ Network Edge:
      Conditioning MAY be performed on per-flow or for aggregated flows
      depending on the configuration and the service offered. Metering
      and (re)marking of DSCP is REQUIRED at the DiffServ edge node and
      on the DiffServ boundary node.  The High Throughput Data service
      class SHOULD use a Single Rate Three Color Marker (srTCM)
      conditioner for AF1x flows and a single rate policer with a burst
      size limit for CS2 flows.

   RECOMMENDED Conditioning Requirements for AF1x marked Packets:




Baker, et al.           Expires August 13, 2004                [Page 32]

Internet-Draft                  Document                   February 2004


      Conditioning of aggregated packet flows destined for the High
      Throughput Data service class MUST be performed at the DiffServ
      edge of the network. Furthermore, conditioning SHOULD be performed
      as defined in RFC 2697 [13].
      If the packets are not pre-marked, then the srTCM MUST be
      configured to operate in the Color-Blind mode.
      If the packets are pre-marked by the source or previous network
      (boundary node) the srTCM SHOULD be configured to operate in the
      Color-Aware mode.

   RECOMMENDED Conditioning Requirements for CS2 marked Packets:
      DiffServ edge and boundary nodes MUST police CS2 marked packets so
      both rate and burst size can be enforced

   The fundamental service offered to "High Throughput Data" traffic is
   enhanced best effort service with a specified minimum rate. It can be
   assumed that this class will consume any available bandwidth, and
   packets traversing congested links may experience higher queuing
   delays and/or packet loss.

   Typical configurations use Explicit Congestion Notification [17] or
   random packet dropping to implement Active Queue Management [7] and
   MAY impose a minimum or maximum rate. The probability of loss of AF11
   traffic MUST NOT exceed the probability of loss of AF12 traffic,
   which in turn MUST NOT exceed the probability of loss of AF13
   traffic. Ingress traffic conditioning passes traffic in the class up
   to some specified threshold marked as AF11, additional traffic up to
   some secondary threshold marked as AF12, and potentially passes
   additional traffic marked as AF13. In such a case, if one network
   customer is driving significant excess and another seeks to use the
   link, any losses will be experienced by the high rate user, causing
   him to reduce his rate.

   Packets marked with CS2 DSCP (OAM&P packets) MUST NOT be put through
   Active Queue Management [7] function.

4.3.2 Standard Service Class

   The Standard service class is RECOMMENDED for traffic that has not
   been classified into one of the other supported forwarding service
   classes in the DiffServ network domain. This service class provides
   the Internet's "best effort" forwarding behavior. This service class
   typically has no bandwidth, delay, loss or jitter assurances.

   The Standard service class MUST use the Default Forwarding (DF) PHB
   defined in RFC 2474 [8] and SHOULD be configured to receive a small
   percentage of forwarding resources (at least 5%). This service class
   MUST be configured to use a Rate Queuing system such as defined in



Baker, et al.           Expires August 13, 2004                [Page 33]

Internet-Draft                  Document                   February 2004


   Section 1.2.1.2 of this document.

   The following application SHOULD use the Standard service class:
   o  Any undifferentiated application/packet flow transported through
      the DiffServ enabled network
   o  In wireless 3GPP applications, traffic that is mapped into the
      UMTS Background Traffic Class

   Traffic Characteristics:
   o  Non deterministic, mixture of everything

   RECOMMENDED DSCP marking is DF (Default Forwarding)

   Network Edge Conditioning:
      There is no requirement that conditioning of packet flows be
      performed for this service class

   The fundamental service offered to the Standard service class is best
   effort service with active queue management to limit over-all delay.
   Typical configurations SHOULD use Explicit Congestion Notification
   [17] or random packet dropping to implement Active Queue Management
   [7], and MAY impose a minimum or maximum rate on the queue.

4.4 Non Critical Traffic Catgegory

   Non-critical traffic category currently has only one service class
   defined for differentiation from Standard traffic. When a need arise
   other service class could be defined in the future.

4.4.1 Low Priority Data

   The Low Priority Data service class serves applications that run over
   TCP [2] or a transport with a consistent congestion avoidance
   procedure [10][11], and which the user is willing to accept service
   without guarantees.  This service class is specified in [24] and RFC
   3662 [23].

   The following applications MAY use the Low Priority Data service
   class:
   o  Any TCP based application/packet flow transported through the
      DiffServ enabled network that does not require any bandwidth
      assurances

   Traffic Characteristics:
   o  Non real-time and elastic

   Network Edge Conditioning:




Baker, et al.           Expires August 13, 2004                [Page 34]

Internet-Draft                  Document                   February 2004


      There is no requirement that conditioning of packet flows be
      performed for this service class

   RECOMMENDED DSCP marking is CS1 (Class Selector 1)

   The fundamental service offered to the Low Priority Data service
   class is best effort service with zero bandwidth assurance.  By
   placing it into a separate queue or class, it may be treated in a
   manner consistent with a specific service level agreement.

   Typical configurations SHOULD use Explicit Congestion Notification
   [17] or random loss to implement Active Queue Management [7].

5. Mapping Applications to Service Classes

   Here we provide some examples for mapping different applications into
   the defined service classes.

   Mapping for Signaling:

   There are many different signaling protocols, ways that signaling is
   used and performance requirements from applications that are
   controlled by these protocols. Therefore we have determined that the
   different signaling protocols be mapped to service classes that best
   meet the objectives. The following mapping is recommended:
      SIP and H.323 are forwarded using Low Latency Data service class
      H.248 and MEGACO are forwarded using the Telephony service class
      SIP-T signaling between call servers in carrier's network using
      Network Control service class.
      RSVP signaling, depends on the application. If RSVP signaling is
      "on-path" as used in IntServ or NSIS, than it needs to be
      forwarded from the same queue (service class) as application data
      that it is controlling. If it is "off-path" (not along the same
      path as its applications data) then, Low Latency Data service
      class should be used for RSVP signaling.

   Mapping for NTP:

   From tests that were performed, indications are that precise time
   distribution requires a very low packet delay variation (jitter)
   transport. Therefore we would suggest the following guidelines for
   NTP be used:
      When NTP is used for providing high accuracy timing within
      administrator's (carrier's) network or to end users/clients, the
      Telephony service class should be used and NTP packets be marked
      with CS5 DSCP.
      For applications that require "wall clock" timing accuracy, the
      Standard service class should be used and packets should be marked



Baker, et al.           Expires August 13, 2004                [Page 35]

Internet-Draft                  Document                   February 2004


      with DF DSCP.

6. Security Considerations

   This document discusses policy, and describes a common policy
   configuration, for the use of a Differentiated Services Code Point by
   transports and applications. If implemented as described, it should
   require the network to do nothing that the network has not already
   allowed. If that is the case, no new security issues should arise
   from the use of such a policy.

   It is possible for the policy to be applied incorrectly, or for a
   wrong policy to be applied in the network for the defined service
   class. In that case, a policy issue exists that the network must
   detect, assess, and deal with. This is a known security issue in any
   network dependent on policy directed behavior.

   A well known flaw appears when bandwidth is reserved or enabled for a
   service (for example, voice transport) and another service or an
   attacking traffic stream uses it. This possibility is inherent in
   DiffServ technology, which depends on appropriate packet markings.
   When bandwidth reservation or a priority queuing system is used in a
   vulnerable network, the use of authentication and flow admission is
   recommended. To the author's knowledge, there is no known technical
   way to respond to an unauthenticated data stream using service that
   it is not intended to use, and such is the nature of the Internet.

7. Achnoledgements

   The authors acknowledge a great many inputs, most notably from Bruce
   Davie, Dave Oran, Ralph Santitoro, Gary Kenward, Francois Audet,
   Brian E Carpenter, Morgan Littlewood, Robert Milne, John Shuler,
   Nalin Mistry and Al Morton. Kimberly King, Joe Zebarth and Alistair
   Munroe each did a thorough proof-reading, and the document is better
   for their contributions.

Normative References

   [1]   Postel, J., "Internet Protocol", STD 5, RFC 791, September
         1981.

   [2]   Postel, J., "Transmission Control Protocol", STD 7, RFC 793,
         September 1981.

   [3]   Braden, B., Clark, D. and S. Shenker, "Integrated Services in
         the Internet Architecture: an Overview", RFC 1633, June 1994.

   [4]   Bradner, S., "Key words for use in RFCs to Indicate Requirement



Baker, et al.           Expires August 13, 2004                [Page 36]

Internet-Draft                  Document                   February 2004


         Levels", BCP 14, RFC 2119, March 1997.

   [5]   Braden, B., Zhang, L., Berson, S., Herzog, S. and S. Jamin,
         "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional
         Specification", RFC 2205, September 1997.

   [6]   Baker, F., Krawczyk, J. and A. Sastry, "RSVP Management
         Information Base using SMIv2", RFC 2206, September 1997.

   [7]   Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S.,
         Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge,
         C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J.
         and L. Zhang, "Recommendations on Queue Management and
         Congestion Avoidance in the Internet", RFC 2309, April 1998.

   [8]   Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of
         the Differentiated Services Field (DS Field) in the IPv4 and
         IPv6 Headers", RFC 2474, December 1998.

   [9]   Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. and W.
         Weiss, "An Architecture for Differentiated Services", RFC 2475,
         December 1998.

   [10]  Allman, M., Paxson, V. and W. Stevens, "TCP Congestion
         Control", RFC 2581, April 1999.

   [11]  Floyd, S. and T. Henderson, "The NewReno Modification to TCP's
         Fast Recovery Algorithm", RFC 2582, April 1999.

   [12]  Heinanen, J., Baker, F., Weiss, W. and J. Wroclawski, "Assured
         Forwarding PHB Group", RFC 2597, June 1999.

   [13]  Heinanen, J. and R. Guerin, "A Single Rate Three Color Marker",
         RFC 2697, September 1999.

   [14]  Heinanen, J. and R. Guerin, "A Two Rate Three Color Marker",
         RFC 2698, September 1999.

   [15]  Herzog, S., "RSVP Extensions for Policy Control", RFC 2750,
         January 2000.

   [16]  Bernet, Y., "Format of the RSVP DCLASS Object", RFC 2996,
         November 2000.

   [17]  Ramakrishnan, K., Floyd, S. and D. Black, "The Addition of
         Explicit Congestion Notification (ECN) to IP", RFC 3168,
         September 2001.




Baker, et al.           Expires August 13, 2004                [Page 37]

Internet-Draft                  Document                   February 2004


   [18]  Baker, F., Iturralde, C., Le Faucheur, F. and B. Davie,
         "Aggregation of RSVP for IPv4 and IPv6 Reservations", RFC 3175,
         September 2001.

   [19]  Herzog, S., "Signaled Preemption Priority Policy Element", RFC
         3181, October 2001.

   [20]  Yadav, S., Yavatkar, R., Pabbati, R., Ford, P., Moore, T.,
         Herzog, S. and R. Hess, "Identity Representation for RSVP", RFC
         3182, October 2001.

   [21]  Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M.,
         Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J. and S.
         Waldbusser, "Terminology for Policy-Based Management", RFC
         3198, November 2001.

   [22]  Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, J.,
         Courtney, W., Davari, S., Firoiu, V. and D. Stiliadis, "An
         Expedited Forwarding PHB (Per-Hop Behavior)", RFC 3246, March
         2002.

   [23]  Bless, R., Nichols, K. and K. Wehrle, "A Lower Effort
         Per-Domain Behavior (PDB) for Differentiated Services", RFC
         3662, December 2003.

   [24]  "QBone Scavenger Service (QBSS) Definition", Internet2
         Technical Report Proposed Service Definition, March 2001.

Informative References

   [25]  Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R. and A.
         Sastry, "The COPS (Common Open Policy Service) Protocol", RFC
         2748, January 2000.

   [26]  Bernet, Y. and R. Pabbati, "Application and Sub Application
         Identity Policy Element for Use with RSVP", RFC 2872, June
         2000.

   [27]  Bonaventure, O. and S. De Cnodder, "A Rate Adaptive Shaper for
         Differentiated Services", RFC 2963, October 2000.

   [28]  Chan, K., Seligson, J., Durham, D., Gai, S., McCloghrie, K.,
         Herzog, S., Reichmeyer, F., Yavatkar, R. and A. Smith, "COPS
         Usage for Policy Provisioning (COPS-PR)", RFC 3084, March 2001.

   [29]  Nichols, K. and B. Carpenter, "Definition of Differentiated
         Services Per Domain Behaviors and Rules for their
         Specification", RFC 3086, April 2001.



Baker, et al.           Expires August 13, 2004                [Page 38]

Internet-Draft                  Document                   February 2004


Authors' Addresses

   Fred Baker
   Cisco Systems
   1121 Via Del Rey
   Santa Barbara, CA  93117
   US

   Phone: +1-408-526-4257
   Fax:   +1-413-473-2403
   EMail: fred@cisco.com


   Jozef Babiarz
   Nortel Networks
   3500 Carling Avenue
   Ottawa, Ont.  K2H 8E9
   Canada

   Phone: +1-613-763-6098
   Fax:   +1-613-768-2231
   EMail: babiarz@nortelnetworks.com


   Kwok Ho Chan
   Nortel Networks
   600 Technology Park Drive
   Billerica, MA  01821
   US

   Phone: +1-978-288-8175
   Fax:   +1-978-288-4690
   EMail: khchan@nortelnetworks.com


















Baker, et al.           Expires August 13, 2004                [Page 39]

Internet-Draft                  Document                   February 2004


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   intellectual property or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; neither does it represent that it
   has made any effort to identify any such rights. Information on the
   IETF's procedures with respect to rights in standards-track and
   standards-related documentation can be found in BCP-11. Copies of
   claims of rights made available for publication and any assurances of
   licenses to be made available, or the result of an attempt made to
   obtain a general license or permission for the use of such
   proprietary rights by implementors or users of this specification can
   be obtained from the IETF Secretariat.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights which may cover technology that may be required to practice
   this standard. Please address the information to the IETF Executive
   Director.


Full Copyright Statement

   Copyright (C) The Internet Society (2004). All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assignees.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION



Baker, et al.           Expires August 13, 2004                [Page 40]

Internet-Draft                  Document                   February 2004


   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.











































Baker, et al.           Expires August 13, 2004                [Page 41]



PAFTECH AB 2003-20262026-04-23 17:41:13