One document matched: draft-shen-nsis-tunnel-00.txt
IETF Next Steps in Signaling C. Shen
Internet-Draft H. Schulzrinne
Expires: January, 2006 Columbia U.
S. Lee
J. Bang
Samsung AIT
July, 2005
NSIS Operation Over IP Tunnels
draft-shen-nsis-tunnel-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 12, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
In this draft we briefly review various IP Tunnelling mechanisms and
discuss the main problems with signaling operation over IP tunnels.
We also summarize the existing RSVP operation over IP tunnels
mechanism. Then we present the design details and case examples of
an NSIS operation over IP tunnels scheme. QoS NSLP is assumed as the
Shen, et al. Expires January 12, 2006 [Page 1]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
NSIS signaling application in our discussion.
Table of Contents
1. Requirements notation . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Problem Statement and Related Work . . . . . . . . . . . . . . 3
3.1 IP Tunnelling Mechanisms . . . . . . . . . . . . . . . . . 3
3.2 Problems on Signaling Operation over IP Tunnels . . . . . 4
3.3 Related Work . . . . . . . . . . . . . . . . . . . . . . . 5
4. Overall Design Approach . . . . . . . . . . . . . . . . . . . 5
4.1 Design Goals . . . . . . . . . . . . . . . . . . . . . . . 6
4.2 Signaling over the Tunnel . . . . . . . . . . . . . . . . 6
4.3 Packet Classification over the Tunnel . . . . . . . . . . 6
4.4 Tunnel Flow Classification Information . . . . . . . . . . 7
4.5 Association of the End-to-End session and Tunnel
Session . . . . . . . . . . . . . . . . . . . . . . . . . 8
5. Protocol Operation for Individual Signaling Tunnels . . . . . 9
5.1 Sender Initiated Signaling . . . . . . . . . . . . . . . . 10
5.2 Receiver-Initiated Signaling . . . . . . . . . . . . . . . 12
6. Protocol Operation for Aggregate Signaling Tunnels . . . . . . 15
6.1 Single Aggregate Tunnel Session . . . . . . . . . . . . . 15
6.2 Multiple Aggregate Tunnel Session . . . . . . . . . . . . 15
6.3 Adjustment of Configured Tunnel Session . . . . . . . . . 16
7. New Object format . . . . . . . . . . . . . . . . . . . . . . 16
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
9.1 Normative References . . . . . . . . . . . . . . . . . . . 17
9.2 Informative References . . . . . . . . . . . . . . . . . . 18
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 18
Intellectual Property and Copyright Statements . . . . . . . . 20
Shen, et al. Expires January 12, 2006 [Page 2]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
1. Requirements notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [1].
2. Introduction
IP tunnel mechanisms are widely used in the Internet for various
purposes. When a tunnel is used to transfer signaling messages, e.g.
NSIS messages, the signaling messages themselves usually become
invisible inside the tunnel. In other words, the tunnel behaves as a
logical link that does not support signaling in the end-to-end path.
If end-to-end NSIS signaling support is desired for a path containing
tunnels, it is necessary to define a scheme that allows NSIS
operation over IP tunnels. This draft describes such a scheme. We
assume QoS NSLP as the NSIS signaling application in our discussion.
3. Problem Statement and Related Work
3.1 IP Tunnelling Mechanisms
There are a number of common tunnelling mechanisms used in the
Internet. A non-exhausted list of them are as follows:
o Generic Routing Encapsulation (GRE) [2] is a mechanism for
encapsulating arbitrary packets within an arbitrary transport
protocol. Generic Routing Encapsulation over IPv4 Networks
(GREIP4) [3] addresses the case of using IPv4 as the delivery
protocol or the payload protocol and the special case of IPv4 as
both the delivery and payload. Generic Routing Encapsulation
(GREIP4A) [17] presented a modified version of [2] , in
particular, some flag bits in the original specification have been
deprecated.
o IP Encapsulation within IP (IP4INIP4) [5] is a method of
tunnelling IPv4 packets using an additional IPv4 header. Minimal
Encapsulation within IP (MINENC) [6] describes a way to reduce the
size of the "inner" IP header used in [5] when the original
datagram is not fragmented.
o Generic Packet Tunnelling in IPv6 Specification (IP6GEN) [9]
specifies a method by which a packet is carried as payload within
an IPv6 packet by being encapsulated in an IPv6 header, and
optionally, a set of IPv6 extension headers.
o IPv6 over IPv4 tunnelling (IP6INIP4) [4] encapsulates IPv6 packets
within IPv4 headers to carry them over IPv4 routing
infrastructures.
o IPSEC [7] has a tunnel mode with the use of Encapsulating Security
Payload (ESP) [8]. The tunnelled IP packets are encrypted and the
Shen, et al. Expires January 12, 2006 [Page 3]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
ESP is placed before the encapsulated IP header.
The above tunnelling mechanisms fall into two broad categories
according to the encapsulating (delivery) header format:
1. Normal IP in IP Encapsulation: the encapsulating header is just a
standard IP header. This group include IP4INIP4, IP6INIP4,
IP6GEN and MINENC. Note that MINENC modifies the original IP
header.
2. Modified IP in IP Encapsulation: the encapsulating header is a
standard IP header plus additional information. This group
includes all GRE-related IP tunnelling, and IPSEC tunnelling
mode. The additional information in these cases is the GRE
header and ESP header respectively. This information is usually
placed between the encapsulating IP header and the original IP
header. Note that in the IPSEC case, the original IP header is
also encrypted along with the original IP payload.
3.2 Problems on Signaling Operation over IP Tunnels
RFC 2746 [18] identifies three ways that a tunnel, and in fact any
sort of link, may participate in a QoS signaling aware network.
o The (logical) link may not support the QoS signaling and resource
reservation at all. This is a best-effort link.
o The (logical) link may be able to promise that some overall level
of resources is available to carry traffic, but not to allocate
resources specifically to individual data flows. An example may
be a configured resource allocation over a tunnel. We refer to
this case as an aggregate signaling tunnel in this note.
o The (logical) link may be able to make reservations for individual
end-to-end data flows. This is referred to as an aggregate tunnel
in this document. The key feature that distinguishes individual
signaling tunnels from aggregate signaling tunnels is that in the
individual signaling tunnel new tunnel reservations are created
and torn down dynamically as end-to-end reservations come and go.
Note that an aggregate or individual signaling tunnel does not
necessarily mean all the intermediate nodes along the tunnel path
support NSIS. This is equivalent to the case of an existing end-to-
end NSIS session transparently passing through non-NSIS cloud.
There are two basic problems associated with signaling operation over
IP tunnels. The first one is identifying signaling messages over the
tunnel. Nodes normally intercept signaling messages based on a
router alert option or a protocol number (e.g. 46 for RSVP). These
information, if present, is carried in the tunnel payload and not
examined by a node inside the tunnel. The second problem is QoS data
Shen, et al. Expires January 12, 2006 [Page 4]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
classification over the tunnel because original QoS data
classification fields are also carried in the tunnel payload and not
examined by intermediate tunnel nodes.
3.3 Related Work
RFC 2746 [18] provides an example scheme for RSVP operation over IP
tunnels. The scheme needs to be supported by both the Tunnel Entry
(Tentry) and Tunnel Exit (Texit). To address the tunnel signaling
visibility problem, separate tunnel signaling sessions are performed
for end-to-end sessions. A binding between the tunnel sessions and
the end-to-end sessions is established. Both the Tentry and Texit
must agree on the binding so that changes in the original reservation
state can be correctly mapped into changes in the tunnel reservation
state, and that errors reported by intermediate routers to the tunnel
end points can be correctly transformed into errors reported by the
tunnel endpoints to the end-to-end RSVP session. To address the
tunnel QoS data visibility problem, a UDP header is inserted to all
QoS data packets following the tunnel IP header. The additional UDP
header provides source and destination ports that allow intermediate
tunnel nodes to use standard RSVP filterspec handling and demultiplex
different tunnel RSVP sessions.
The RFC 2746 scheme also mentions that in the case where the IP-in-IP
tunnel supports IPSEC (especially ESP in tunnel-mode with or without
AH), the tunnel session uses the GPI SESSION and GPI SENDER_TEMPLATE,
FILTER_SPEC as defined in [19] for the PATH and RESV messages. Data
packets are not encapsulated with a UDP header since the SPI can be
used by the intermediate nodes for classification purposes.
The design of NSIS operation over IP tunnels in this document is
conceptually similar to RSVP operation over IP tunnels. However, it
also addresses the important differences of NSIS from RSVP, e.g.,
o NSIS is based on a two-layer architecture, namely a signaling
transport layer and a signaling application layer. It is designed
as a generic framework to accommodate various signaling
application needs. The basic RSVP protocol does not have a layer
split and is only for QoS signaling.
o NSIS QoS NSLP allows both sender initiated and receiver initiated
reservations; RSVP only supports receiver initiated reservations.
o NSIS deals only with unicast; RSVP also supports multicast.
o NSIS integrates new features, such as the Session ID, to
facilitate operation in specific environments (e.g. mobility and
multi-homing).
4. Overall Design Approach
Shen, et al. Expires January 12, 2006 [Page 5]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
4.1 Design Goals
This document presents a scheme to enable NSIS operation over IP
tunnels. The design goals of the scheme are as follows,
o For best effort tunnel, make sure NSIS messages traverse the link
correctly, and the presence of the non-NSIS aware link is
detected.
o For aggregate and individual signaling tunnels, make sure proper
signaling is carried out in the tunnel for the end-to-end flow.
o Work with most, if not all, existing IP in IP tunnelling schemes.
o Place the additional tunnel related functionalities only in one or
both of the tunnel end points.
o If possible, make NSIS tunnel signaling handle specific events in
a consistent way as that of NSIS signaling without tunnelling. An
example is mobility interaction.
4.2 Signaling over the Tunnel
When packets enter the IP tunnel, its original header and payloads
are put into the tunnel payload and normally not examined by the
intermediate tunnel nodes. This is the case for both signaling
messages and data packets. So this affects both signaling and data
packet classification over the tunnel.
To perform signaling over the tunnel, it is not sufficient to make
the original end-to-end messages available to intermediate tunnel
nodes. For example, consider a Mobile IP forwarding tunnel from the
Home Agent (HA) to the Mobile Node (MN), an end-to-end signaling
message will carry the Correspondent Node (CN or flow source) address
and MN Home Address (HoA or flow destination) as the Message Routing
Information (MRI). This MRI cannot be used directly for signaling
inside the tunnel. For this reason, the tunnel end points are
required to generate separate tunnel signaling messages reflecting
the tunnel specific MRI. Tunnel signaling should thus be carried out
independent of the end-to-end signaling. For the same signaling
session, its end-to-end and tunnel signaling should also be properly
associated, so that any change in one of them may be mapped to the
other.
4.3 Packet Classification over the Tunnel
Packet classification over the tunnel may be done in either of the
two ways: first, retain the end-to-end packet classification rule
inside the tunnel; second, use tunnel specific classification rule
inside the tunnel. We call the specific fields used for packet
classification the Flow Classification Information (FCI). In the
first approach, the tunnel FCI is not tied to the tunnel MRI. This
Shen, et al. Expires January 12, 2006 [Page 6]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
is a useful characteristics especially in handling tunnel mobility -
as mobility occurs, the tunnel MRI changes, but the FCI does not
change. Therefore, the common path after a handover does not need to
be updated, resulting in a better handover performance. The main
problem with this approach is that most existing routers do not
support inspection of inner headers in an IP tunnel.
The second approach constructs the tunnel FCI based on the tunnel
delivery header, or MRI of the tunnel signaling messages. This
approach does not pose special requirements on intermediate tunnel
nodes, so it is used in this document.
4.4 Tunnel Flow Classification Information
FCI determines the tunnel Flow ID. The Tunnel Flow ID is used to
distinguish a properly signalled flow from the rest, none-signaled
traffic. Among all signalled traffic, the flow ID also needs to
distinguish among each signaled flows. Note that a flow can be an
individual flow or an aggregate flow.
Possible FCI for individual tunnel flows are:
o Selected fields from the tunnel base IP header (outer IP header).
Usually this includes both the IP source and destination address
and additional fields. When IPv6 flow label is available, the
combination of IP source address, destination address and flow
label is the recommended FCI. Otherwise, we propose to use the
combination of IP source address, destination address and the DSCP
field as FCI. This usage will not cause confusion with the use of
DSCP for aggregate FCI, as long as individual flow classification
is processed before aggregate flow classification, or when a
longest match kind of packet classifier is used. In the rare
cases where these conditions could not be satisfied, it is still
possible to choose different range of DSCP values for individual
and aggregate flows respectively. Compared to the IPv6 flow label
approach, this new FCI containing DSCP can be applied to both IPv4
and IPv6 and is probably easier to deploy. Its drawback is that
the number of bits in the DSCP field limits the total number of
individual flows that can be distinguished in the tunnel.
Overall, FCI formats in this group enable efficient packet
classification over the tunnel without introducing additional
processing requirements on the existing infrastructure. They are
also easy to deploy. The use of flow label is documented in
RFC3697 [20], and the use of DSCP as discussed can be readily
achieved by using the MF classifier defined in RFC2475 [10].
o Selected fields from the tunnel base IP header plus additional
information outside the base IP header but still in the tunnel
Shen, et al. Expires January 12, 2006 [Page 7]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
delivery header. This applies to modified IP-in-IP encapsulation
as we defined in the problem statement in Section 3. An example
of this is the SPI field for IPSEC tunnels, similar to that
proposed in [19]. Comparing with the first approach, FCI in this
group poses more requirements at the NSIS protocol side because it
uses information unique to the specific tunnel mechanism. NSIS
thus needs to be specifically tuned to recognize that information
as part of a signaling message. This is similar to how RFC 2207
[19] has extended RSVP to accommodate IPSEC.
o UDP header insertion. Inserting a new UDP header between the
tunnel IP header and the tunnel payload provides additional
demultiplexing information for a flow. The drawback of the FCI in
this group, as compared to the above two, is the additional UDP
header overhead both for bandwidth and processing.
Most of the above FCI formats may be used for aggregate tunnel flows
as well. A common aggregate FCI contains the DSCP value. When
additional interfaces at the tunnel end points are available, we also
propose to use these addresses directly for aggregate FCI. E.g., the
IP address of an additional interface for a Tentry plus the IP
address of the Texit, form an aggregate FCI. When the FCI has been
chosen, all subsequent QoS data packets for the flow should be
encapsulated using the particular FCI format. Packets belong to
these flows can then be filtered by tunnel intermediate nodes for
special treatment.
4.5 Association of the End-to-End session and Tunnel Session
Assignment of the tunnel FCI may be done by either Tentry or Texit.
However, it will generally be simpler for the entity that initiates
tunnel QoS reservation to perform this task. That means, the sender
in Sender-Initiated scenario and the receiver in Receiver-Initiated
scenario will be responsible for tunnel FCI assignment. Once tunnel
FCI is chosen, the Flow ID for the tunnel session is also determined.
NSIS tunnel signaling requires the coordination between the original
end-to-end signaling and the tunnel signaling. Therefore, some
association between the end-to-end session and the tunnel session
needs to be established in either or both of the tunnel end points.
For aggregate signaling tunnels, the original end-to-end session and
the associated aggregate tunnel session require independent control.
In other words, they end-to-end session and the aggregate session do
not need to have the same lifetime. These sessions should use
different Session IDs.
Individual signaling tunnels are different from aggregate signaling
Shen, et al. Expires January 12, 2006 [Page 8]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
tunnels in that individual tunnel sessions are created and deleted
along with the related end-to-end session. Therefore, the
association between the end-to-end session and the corresponding
individual tunnel session has two choices: first, they may use two
different Session IDs as in the case of aggregate signaling tunnels.
Second, they may share the same Session ID, which should be the
Session ID of the original end-to-end session. The advantage of the
first choice is that we would have a unified session association
approach for both aggregate and individual signaling tunnels. The
advantage of the second choice is that it conform to the general rule
that the Session ID should not be modified end-to-end [11]. It also
makes the handling of NSIS mobility inside the tunnel consistent with
the NSIS mobility mechanism outside the tunnel.
We call the association of two different Session IDs and the convey
of this relationship "inter-session binding"; the association of two
Flow IDs with the same Session ID and the convey of this relationship
is called "intra-session binding". "inter-session binding" can be
achieved by the BOUND_SESSION_ID object defined in NSIS QoS NSLP
specification [13]. There is no existing object for "intra-session
binding", a new BOUND_FLOW_SESSION object is thus defined for this
purpose.
It is clear that "inter-session binding" should be used for aggregate
signaling tunnels. It is less clear which binding format should be
used for individual signaling tunnels. In current version of this
document we assume "intra-session binding'' is used for individual
signaling tunnels. Note that the basic operation flow of NSIS
signaling over an individual signaling tunnel is actually similar
when either "inter-session binding" or "intra-session binding" is
used. The difference is basically on the use of the corresponding
BOUND_SESSION_ID or BOUND_FLOW_SESSION object. However, when it
comes to advanced features such as mobility handling, the two choices
may result in very different behavior.
5. Protocol Operation for Individual Signaling Tunnels
For an individual signaling tunnel, a tunnel session is dynamically
created and one-to-one mapped to an end-to-end session. In this
document we identify four scenarios of NSIS tunnelling operation, two
for Sender-Initiated and two for Receiver-Initiated operation. In
all these scenarios, we require that all Tentry and Texit be NSIS
aware. Furthermore, some or both of the tunnel end points need to be
NSIS tunnel aware. An NSIS tunnel aware node should be able to
associate an end-to-end session with a tunnel session, and
subsequently coordinate the signaling between the end-to-end session
and the tunnel session, e.g., setting the NON QoSM HOP flag ([14])
for the end-to-end session before confirmation of the tunnel session
Shen, et al. Expires January 12, 2006 [Page 9]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
is received, and adjustment of the reservation upon changes either
inside or outside the tunnel. All Tentries are also required to
encapsulate related QoS data packets according to the chosen FCI so
they can be filtered by intermediate nodes along the tunnel.
5.1 Sender Initiated Signaling
Sender Tentry Tnode Texit Receiver
| | | | |
| RESERVE | | | |
+--------->| | | |
| | RESERVE' | | |
| +=========>| | |
| | | RESERVE' | |
| | +=========>| |
| | | RESPONSE'| |
| | |<=========+ |
| | RESPONSE'| | |
| |<=========+ | |
| | RESERVE | |
| +-------------------->| |
| | | | RESERVE |
| | | +--------->|
| | | | RESPONSE |
| | | |<---------+
| | RESPONSE | |
| |<--------------------+ |
| RESPONSE | | | |
|<---------+ | | |
| | | | |
| | | | |
Figure 1: Sender-Initiated QoS NSLP over Tunnel - Scenario A
Figure 1 shows the Sender-Initiated Scenario A (SI-A). The sender
first sends the end-to-end RESERVE message which arrives at Tentry.
If Tentry supports tunnel signaling and determines that an individual
tunnel session needs to be established for the end-to-end session, it
creates the tunnel Flow ID by choosing the appropriate tunnel FCI and
associates the end-to-end session with the tunnel session. It then
sends a tunnel RESERVE message (RESERVE') matching the end-to-end
session toward the Texit and requests a response. The RESERVE'
message is processed hop by hop inside the tunnel for the tunnel flow
identified by the chosen tunnel Flow ID. Upon successfully receiving
the tunnel RESPONSE message (RESPONSE') confirming the tunnel
Shen, et al. Expires January 12, 2006 [Page 10]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
signaling, Tentry encapsulates the end-to-end RESERVE message same as
other tunnel packets and sends it to Texit. The Texit encapsulates
this RESERVE message, process it and continue to forward it to the
receiver. When the RESPONSE to the end-to-end RESERVE message
reaches Texit, the Texit processes it and forwards it back toward the
sender. Note that all tunnel signaling messages have standard NSIS
signaling message formats, but they use tunnel specific MRI and may
contain slightly different tunnel adjusted QoS parameters.
Sender Tentry Tnode Texit Receiver
| | | | |
| RESERVE | | | |
+--------->| | | |
| | RESERVE' | | |
| +=========>| | |
| | | RESERVE' | |
| | +=========>| |
| | RESERVE | |
| +-------------------->| |
| | | | RESERVE |
| | | +--------->|
| | | | RESPONSE |
| | | |<---------+
| | | RESPONSE'| |
| | |<=========+ |
| | RESPONSE'| | |
| |<=========+ | |
| | RESPONSE | |
| |<--------------------+ |
| RESPONSE | | | |
|<---------+ | | |
| | | | |
| | | | |
Figure 2: Sender-Initiated QoS NSLP over Tunnel - Scenario B
Figure 2 shows the Sender-Initiated Scenario B (SI-B). In this case,
Tentry is also responsible for determining the tunnel FCI and
associating the end-to-end session with the tunnel session. This
scenario differs from SI-A mainly in the sequence of the end-to-end
and tunnel signaling. In SI-A, the Tentry does not forward the end-
to-end RESERVE message to Texit until the tunnel signaling is
confirmed by the tunnel response message. In SI-B, once the Tentry
receives the end-to-end RESERVE, it sends out the RESERVE' but also
forward the end-to-end RESERVE as normal encapsulated to Texit.
Shen, et al. Expires January 12, 2006 [Page 11]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
Similarly, the end-to-end RESPONSE message and tunnel RESPONSE
messages are forwarded independently and associated with each other
at Tentry. If there is any change in either of the sessions,
adjustment can be propagated to the other session through Tentry.
SI-A can be considered as a sequential signaling approach, while SI-B
can be considered as a parallel signaling approach. Note that in
SI-B, since the Tentry has no idea whether the tunnel signaling will
be successful when it proceeds with the end-to-end signaling, it
should set the NON QoSM HOP flag as defined in [14] when it forwards
the first end-to-end RESERVE message to Texit.
The above description in SI-A and SI-B assumes that Tentry is the
only NSIS tunnel aware nodes. Although Texit also sends out tunnel
signaling messages, this could be done by standard NSIS signaling
behavior. So Texit is NSIS aware but not necessarily NSIS tunnel
aware. In some cases, Texit may indeed be NSIS tunnel aware. If
Tentry wants to find that out, it MAY include a BOUND_FLOW_SESSION
object in the end-to-end RESERVE message sent from Tentry to Texit.
The object contains the tunnel Flow ID chosen by Tentry and the
Session ID. At the Texit, if this object is not recognized, it
should be dropped. But the RESERVE message is processed as normal.
If the object is recognizable, then the Texit is NSIS tunnel aware.
It will record the association between the end-to-end session
identified by the Session ID and the tunnel session identified by the
Flow ID. It can then also participate in the tunnel signaling
process. For example, the adjustment of reservation due to changes
inside or outside of the tunnel or possibly setting the NON QOSM HOP
flag during the initial reservation setup in SI-B.
5.2 Receiver-Initiated Signaling
Sender Tentry Tnode Texit Receiver
| | | | |
| QUERY | | | |
+--------->| | | |
| | QUERY | |
| +-------------------->| |
| | | | QUERY |
| | | +--------->|
| | | | RESERVE |
| | | |<---------+
| | RESERVE | |
| |<--------------------+ |
| | QUERY' | | |
| +=========>| | |
Shen, et al. Expires January 12, 2006 [Page 12]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
| | | QUERY' | |
| | +=========>| |
| | | RESERVE' | |
| | |<=========+ |
| | RESERVE' | | |
| |<=========+ | |
| | RESPONSE'| | |
| +=========>| | |
| | | RESPONSE'| |
| | +=========>| |
| RESERVE | | | |
|<---------+ | | |
| RESPONSE | | | |
+--------->| | | |
| | RESPONSE | |
| +-------------------->| |
| | | | RESPONSE |
| | | +--------->|
| | | | |
| | | | |
Figure 3: Receiver-Initiated QoS NSLP over Tunnel - Scenario A
Figure 3 shows the Receiver-Initiated Scenario A (RI-A). The Tentry
receives the first end-to-end QUERY message from the Sender. It
encapsulates the QUERY and forward it to Texit. Texit further
forwards the QUERY to the receiver, which issues an end-to-end
RESERVE. The Texit receives the first end-to-end RESERVE. It
determines that an individual tunnel session should be created for
the end-to-end session. Texit creates the tunnel Flow ID by choosing
the appropriate tunnel FCI and associates the end-to-end session with
the tunnel session. This tunnel Flow ID must be conveyed to the
Tentry because the Tentry needs to trigger a tunnel signaling
exchange and is also responsible for encapsulating selected data
packets according to the specific Flow ID. Texit does this by
appending a BOUND_FLOW_SESSION object to the RESERVE message sent
directly back to Tentry. Upon receiving this RESERVE message, if
Tentry does not recognize the BOUND_FLOW_SESSION object, it should
drop this object and process the RESERVE message as normal. If
Tentry recognize the BOUND_FLOW_SESSION object, it is NSIS tunnel
aware. So the Tentry should record the association of the tunnel
session and the end-to-end session, and send out a tunnel QUERY
(QUERY') toward the Texit. Texit replies with a RESERVE' to Tentry.
Upon successful tunnel reservation, the Tentry forwards the end-to-
end RESERVE upstream toward the Sender and also returns a RESPONSE'
to Texit. The Tentry will also receive a RESPONSE from the Sender,
which will be tunnelled to Texit.
Shen, et al. Expires January 12, 2006 [Page 13]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
Sender Tentry Tnode Texit Receiver
| | | | |
| QUERY | | | |
+--------->| | | |
| | QUERY | |
| +-------------------->| |
| | | | QUERY |
| | | +--------->|
| | | | RESERVE |
| | | |<---------+
| | RESERVE | |
| |<--------------------+ |
| RESERVE | | | |
|<---------+ | | |
| | QUERY' | | |
| +=========>| | |
| | | QUERY' | |
| | +=========>| |
| | | RESERVE' | |
| | |<=========+ |
| | RESERVE' | | |
| |<=========+ | |
| | RESPONSE'| | |
| +=========>| | |
| | | RESPONSE'| |
| | +=========>| |
| RESPONSE | | | |
+--------->| | | |
| | RESPONSE | |
| +-------------------->| |
| | | | RESPONSE |
| | | +--------->|
| | | | |
| | | | |
Figure 4: Receiver-Initiated QoS NSLP over Tunnel - Scenario B
RI-A represents a sequential signaling approach, where the first
RESERVE message is not forwarded upstream until the tunnel
reservation has been made. Figure 2 shows the parallel signaling
approach. The procedure in RI-B is the same as in RI-A up to the
point when Tentry receives the first end-to-end RESERVE message and
sends out the QUERY' message. Instead of waiting for the tunnel
signaling to finish, Tentry immediately forwards the end-to-end
RESERVE upstream. The subsequent RESPONSE' and end-to-end RESPONSE
messages are also sent independently and associated with each other
Shen, et al. Expires January 12, 2006 [Page 14]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
at the tunnel end points.
Unlike the Sender-Initiated cases, Receiver-Initiated scenarios
require both Tentry and Texit to be NSIS tunnel aware. This means
both end points need to keep an association of the tunnel session and
the end-to-end session. Adjustment of either session caused by the
other may be done through either tunnel end point.
Note that in RI-B, when Tentry receives the first RESERVE message
from Texit, it has no idea about whether the tunnel session will be
successful or whether the tunnel itself contains non QoSM nodes. The
Tentry should therefore set the NON QoSM HOP flag before forwarding
the first end-to-end RESERVE message.
Future versions of this document will contain more details about the
procedures and procedures for additional scenarios, such as
bidirectional reservations.
6. Protocol Operation for Aggregate Signaling Tunnels
An aggregate signaling tunnel may contain one or more aggregate
tunnel sessions configured through management interface.
6.1 Single Aggregate Tunnel Session
If a single aggregate session is configured in the tunnel and all
traffic will receive the reserved tunnel resources, all the packets
just need to be normal IP-in-IP encapsulated. If there is a single
aggregate session configured in the tunnel and only some traffic
should receive the reserved resources through that aggregate tunnel
session, then the aggregate tunnel session should be assigned a Flow
ID based on an appropriate aggregate flow FCI. Qualified packets
need to be encapsulated with this FCI. The rest of the traffic will
be normal IP-in-IP encapsulated.
6.2 Multiple Aggregate Tunnel Session
If there are multiple configured NSIS sessions over a tunnel set up
by the management interface, these sessions must be distinguished by
their aggregate tunnel Flow IDs based on appropriate FCI. In this
case it is necessary to explicitly bind the end-to-end session with
the specific tunnel session. As described in Section 4.5, this
binding is provided by the BOUND_SESSION_ID object which is carried
in the end-to-end RESERVE message. Once the binding has been
established, Tentry should encapsulate qualified data packets from
different flows according to the associated aggregate tunnel session
FCI. Intermediate nodes in the tunnel will then be able to filter
these packets to receive reserved resources.
Shen, et al. Expires January 12, 2006 [Page 15]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
6.3 Adjustment of Configured Tunnel Session
The reservation of a configured tunnel session may or may not be
adjustable. When the tunnel session is adjustable and there can be a
many-to-one mapping to the tunnel session, the tunnel manager needs
to decide how the adjustment to the tunnel reservation should be done
to accommodate the end-to-end sessions mapped onto it. As discussed
in [18], there could be multiple choices. In the first, the tunnel
reservation is never adjusted, which makes the tunnel a rough
equivalent of a fixed-capacity hardware link. In the second, the
tunnel reservation is adjusted whenever a new end-to-end reservation
arrives or an old one is torn down. Doing this will require the
Texit to keep track of the resources allocated to the tunnel and the
resources actually in use by end-to-end reservations separately. It
is often appropriate to adopt a third choice, where we use some
hysteresis in the adjustment of the tunnel reservation parameters.
The tunnel reservation is adjusted upwards or downwards occasionally,
whenever the end-to-end reservation level has changed enough to
warrant the adjustment. This trades off extra resource usage in the
tunnel for reduced control traffic and overhead.
7. New Object format
This draft defines a BOUND_FLOW_SESSION object for intra-session
binding. It has the Type-Length-Value (TLV) object format shown
below.
Type: BOUND_FLOW_SESSION
Length: Variable
Value: specifies the Session ID and a Flow ID that it should be
associated with.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Session ID +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
// Flow ID (for the tunnel session) //
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Shen, et al. Expires January 12, 2006 [Page 16]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
Figure 5: BOUND_FLOW_SESSION Object
Note that use of this BOUND_FLOW_SESSION object in the Receiver-
Initiated tunnel signaling scenario as specified in Section 5.2
essentially serves as a trigger to initiate a reservation process
from a specific node to the node sending this object. If this can be
identified as a general behavior applicable also to other scenarios,
it may be necessary to create a separate message type for this
purpose.
8. Security Considerations
9. References
9.1 Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[2] Hanks, S., Li, T., Farinacci, D., and P. Traina, "Generic
Routing Encapsulation (GRE)", RFC 1701, October 1994.
[3] Hanks, S., Li, T., Farinacci, D., and P. Traina, "Generic
Routing Encapsulation over IPv4 networks", RFC 1702,
October 1994.
[4] Gilligan, R. and E. Nordmark, "Transition Mechanisms for IPv6
Hosts and Routers", RFC 2893, August 2000.
[5] Perkins, C., "IP Encapsulation within IP", RFC 2003,
October 1996.
[6] Perkins, C., "Minimal Encapsulation within IP", RFC 2004,
October 1996.
[7] Kent, S. and R. Atkinson, "Security Architecture for the
Internet Protocol", RFC 2401, November 1998.
[8] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload
(ESP)", RFC 2406, November 1998.
[9] Conta, A. and S. Deering, "Generic Packet Tunneling in IPv6
Specification", RFC 2473, December 1998.
[10] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W.
Weiss, "An Architecture for Differentiated Services", RFC 2475,
December 1998.
Shen, et al. Expires January 12, 2006 [Page 17]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
9.2 Informative References
[11] Hancock, R., "Next Steps in Signaling: Framework",
draft-ietf-nsis-fw-07 (work in progress), December 2004.
[12] Schulzrinne, H. and R. Hancock, "GIMPS: General Internet
Messaging Protocol for Signaling", draft-ietf-nsis-ntlp-06
(work in progress), May 2005.
[13] Bosch, S., Karagiannis, G., and A. McDonald, "NSLP for Quality-
of-Service signaling", draft-ietf-nsis-qos-nslp-06 (work in
progress), February 2005.
[14] Ash, J., "QoS-NSLP QSPEC Template", draft-ietf-nsis-qspec-04
(work in progress), May 2005.
[15] Stiemerling, M., "NAT/Firewall NSIS Signaling Layer Protocol
(NSLP)", draft-ietf-nsis-nslp-natfw-06 (work in progress),
May 2005.
[16] Lee, S., "Applicability Statement of NSIS Protocols in Mobile
Environments",
draft-ietf-nsis-applicability-mobility-signaling-01 (work in
progress), February 2005.
[17] Farinacci, D., Li, T., Hanks, S., Meyer, D., and P. Traina,
"Generic Routing Encapsulation (GRE)", RFC 2784, March 2000.
[18] Terzis, A., Krawczyk, J., Wroclawski, J., and L. Zhang, "RSVP
Operation Over IP Tunnels", RFC 2746, January 2000.
[19] Berger, L. and T. O'Malley, "RSVP Extensions for IPSEC Data
Flows", RFC 2207, September 1997.
[20] Rajahalme, J., Conta, A., Carpenter, B., and S. Deering, "IPv6
Flow Label Specification", RFC 3697, March 2004.
Authors' Addresses
Charles Shen
Columbia University
Department of Computer Science
1214 Amsterdam Avenue, MC 0401
New York, NY 10027
USA
Phone: +1 212 854 5599
Shen, et al. Expires January 12, 2006 [Page 18]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
Email: charles@cs.columbia.edu
Henning Schulzrinne
Columbia University
Department of Computer Science
1214 Amsterdam Avenue, MC 0401
New York, NY 10027
USA
Phone: +1 212 939 7004
Email: schulzrinne@cs.columbia.edu
Sung-Hyuck Lee
SAMSUNG Advanced Institute of Technology
San 14-1, Nongseo-ri, Giheung-eup
Yongin-si, Gyeonggi-do 449-712
KOREA
Phone: +82 31 280 9585
Email: starsu.lee@samsung.com
Jong Ho Bang
SAMSUNG Advanced Institute of Technology
San 14-1, Nongseo-ri, Giheung-eup
Yongin-si, Gyeonggi-do 449-712
KOREA
Email: jh0278.bang@samsung.com
Shen, et al. Expires January 12, 2006 [Page 19]
Internet-Draft NSIS Operation Over IP Tunnels July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Shen, et al. Expires January 12, 2006 [Page 20]
| PAFTECH AB 2003-2026 | 2026-04-23 20:57:59 |