Berkeley-Helsinki Summer Course Lecture #10: Service Level Agreements and Clearinghouses
Berkeley-Helsinki Summer Course Lecture #10: Service Level Agreements and Clearinghouses
e
+
|
|
.
|
\
|
+
= A
) ( '
'
) ( '
'
) ( '
'
1
' '
) ( '
'
1 ) (
k
BE
K k
AF
K
k
AF
K k
EF
K
s k
k
s k
k
s k
k k k
s k
k k k
k
w w
D d D s R w
o o
o o
o
+
e ) (
k G
s e
e
x
o
) (
k
s A
|
|
.
|
\
|
=
+
e
) ( , min ) (
) (
k
s e
e k
s A x s R
k G
o
effective
access rate
weighted fair
allocation of
unallocated
capacity
34
DiffServ Requirements
Bandwidth differentiation
Delay and delay jitter differentiation
Forwarding
Scheduling
EF delay
Non-EF delay
Loss differentiation
35
Traffic Engineering Model
Forwarding
buffer
acceptance
scheduling
queueing loss
input output
36
Traffic Engineering Model
Scheduling
SP
WFQ
WTP
WFQ
EF
AF1
AF2
AF3
AF4
BE
R(EF)
R(AF)
R(BE)
37
DiffServ Requirements
Delay Differentiation: EF Delay
Delay of a single EF-hop
Markov process, low signaling load
Delay of a series of EF-hops
asymmetric EF-load: lightly-heavily loaded links
Busy periods of EF-traffic
Conclusion
Delay upper bound expressed as upper bound on EF-load
Delay jitter < D
queue
min serial queue EF
D D D D + + =
( ) MTU R D D
EF SH queue SH queue
, ,
, ,
=
( )
hl EF chain queue chain queue
H H MTU R D D , , , ,
, ,
=
38
DiffServ Requirements
EF Delay Differentiation
q
u
e
u
i
n
g
d
e
l
a
y
[
m
s
]
EF load [%]
(1-P) quantiles of the queuing delay of EF packets
decreasing P
0 50 100
20
0
39
DiffServ Requirements
Delay Differentiation: Non-EF Delay
WFQ with service
interruptions
fluid flow assumption
exponential distributions
Conclusion:
service differentiation
possible
proportionality difficult to
ensure in all cases
WFQ
Busy periods
of high-
priority
traffic
P
int
T
int
Service
interrupt of
low-priority
traffic
R R(1-P
int
)
b
1
b
2
b
3
low-priority
traffic
queues
class 1
class 2
class 3
40
DiffServ Requirements
Non-EF Delay Differentiation
class 1 load
class 5 load
Average delay ratio
41
DiffServ Requirements
Loss Differentiation
Loss calculations are made based on
Buffer rejection prob
of class c with drop
precedence d
class in/out profile buffer
acceptance
Service rate
EF Always in
(edge discarding/shaping)
TAIL R
AF Green/yellow/red
(TrTcM)
RIO |
c
R(1-
EF
)
BE Always in
(no profile)
TAIL |
c
R(1-
EF
)
t
cd
Q
c
Q
c
0
0
1
1-a
cd
(q)
q
r
cd
t
cd
Q
c
42
Verifying that SLAs are
Satisfied
Carrier-based reports
Interpretation of report and its statistics
Gaps in statistics gathering
Process for gathering data
Optimization of the network
Capital investment to evolve the network
Recurring transmissions costs
Bandwidth growth caused by rogue users/apps
Ability to warn users before performance degradation
becomes noticed
Active monitoring may be necessary
43
Outline
Applications and Performance
Service Level Agreements
Traffic Engineering to Deliver SLAs
Bandwidth Brokering
Clearing House
44
Internet2 Research Project
Quality of Service Backbone (QBone)
Experimental deployment of DiffServ capabilities into a WAN
networking testbed to determine what works and doesnt work
DiffServ tenets:
Aggregation into small # of DS behavior aggregates in core
Bilateral service level agreements (SLAs) between domains
Max flexibility in local resource management decisions
Bandwidth Broker (BB) Architecture for cooperatively allocating
bandwidth among network flows
Premium vs. best effort service
Focus on inter-domain signaling, with separate schemes for
DiffServ implemented in each participating domain
45
Internet2 Research Project
Bandwidth Broker Resource Managers
Based on IETF DiffServ
Service Level Specification/Negotiation left unaddressed
Only kind of service currently managed is QBone Premium
Service (QPS)
Quantitative, absolute b/w assurance within a domain,
intra-domain from edge to edge, or inter-domain
No loss due to congestion, no latency guarantees,
worst-case jitter bounds (except for IP route
changes)
Generalization to other kinds of services
When/where will service be provided?
How is desired level of service specified?
How is provided service described? Quantitative vs.
qualitative
46
Transit Domain 1
BB
BB
Transit Domain 2
BB
BB
BB
Sink Domain
Source Domain
ER
ER
ER
ER
ER
ER
ER
SLA
SLA
SLA
Data Flow
Data Flow
RSVP
47
Bandwidth Brokers
Brokers as Oracles
Receive resource allocation request (RAR) from
An element in the domain that the BB controls
A request from a peer (adjacent) bandwidth broker
Admission control: BB responds with confirmation or denial of service
via a Resource Allocation Answer (RAA)
Input to BB: space-time coordinates of the service, kind of service
(its parameters), characteristics of the input
SLAs in this context
Bilateral, concluded between peered domains
Guarantee traffic offered by (peer) customer domain, meeting
certain conditions, carried by the service provider domain to one or
more egress points with one or more particular service levels
May be hard or soft, carry tariffs, and certain monetary or legal
consequences if not met
48
Bandwidth Brokers
SLS in this context
Contains technical details of the SLA
Asserts traffic of a given class, meeting specific policing
conditions, entering the domain on a given link, will be treated
according to a particular PHB(s)per hop behaviors (e.g.,
expedited forwarding)
If traffic destination is not receiving domain, then pass it to
another domain (on path toward destination according to routing
tables) with similar (compatible and comparable) SLS specifying
an equivalent (set of) PHB(s)
TCS: Traffic Conditioning Specification
Specifies classifier rules, corresponding traffic profiles &
metering, marking, discarding, shaping rules applied to traffic
aggregates selected by the classifier
49
Bandwidth Brokers
Reservations
Actually committed resources, but not necessarily used
Tracked by BB, shared with network management system
Actual resource use tracked by routers, possibly
monitored by bandwidth broker
50
Bandwidth Brokers:
Nodal Architecture
51
Bandwidth Brokers
Key Protocols
User/application protocol:
resource allocation requests from
within BB's domain
Intra-domain protocol:
communicate BB decisions to
routers within its domain as router
configuration parameters for QoS
operation/possibly communicate
with policy enforcement agent
within the router
Inter-domain protocol: provide
mechanism for peering BBs to ask
for/answer with admission control
decisions for aggregates and
exchange traffic
Data Interfaces
Routing Tables: inter-domain info
determines egress router(s) &
downstream DS domains whose resources
committed before accepting RARs; may
require intra-domain info to determine
paths and resource allocation information
within the domain
Data Repository: common info for BB
components:
SLS info for ingress/egress routers
Current reservations/resource
allocations
Router configurations
Service/DSCP mappings
Policy info
Network mgmt info
Router Monitoring info
Authorization/authentication DBs
for users & peers
52
Previous Work
Static resource pre-partitioning
E.g., PSTN trunking
Pros: Dedicates resources for end-to-end flows
Cons: Based on worst-case analysis, leading to inefficient
network utilization => Costly and not adaptive to dynamic
traffic fluctuation
Int-Serv with RSVP
On-demand, per-flow, end-to-end reservation and
admission control
Pros: Provides end-to-end QoS assurance
Cons: Requires per flow state information in the core
networks => Not scalable!
53
Previous Work (contd)
Diff-Serv Bandwidth Brokers (BBs)
Admission control only at the edge and BBs negotiate pair-
wise SLAs with neighboring domains
Pros: Preserves scalability
Cons:
Admission control is based on local information
and the core supports per-hop behaviors =>
Unpredictable end-to-end QoS
One centralized broker per domain may cause a single
point of congestion/failure in large domains
54
Outline
Applications and Performance
Service Level Agreements
Traffic Engineering to Deliver SLAs
Bandwidth Brokering
Clearing House
55
Clearinghouse
Vision: data, multimedia (video, voice, etc.) and
mobile applications over one IP-network
Video conferencing,
Distance learning
Web surfing, emails,
TCP connections
IP Based
Core
PSTN
VoIP
(e.g. Netmeeting)
H.323
Gateway
GSM
Wireless
Phones
Question: How to regulate resource allocation within
and across multiple domains in a scalable
manner to achieve end-to-end QoS?
56
Clearinghouse Goals
Design/build distributed control architecture for
scalable resource provisioning
Predictive reservations across multiple domains
Admission control & traffic policing at edge
Demonstrate architectures properties and performance
Achieve adequate performance w/o edge per-flow state
Robust against traffic fluctuations and misbehaving flows
Prototype proposed mechanisms
Min edge router overhead for scalability/ease of deployment
57
Clearinghouse Architecture
Clearinghouse distributed architecture--each CH-
node serves as a resource manager
Functionalities
Monitors network performance on ingress & egress links
Estimates traffic demand distributions
Adapts trunk/aggregate reservations within & across domains
based on traffic statistics
Performs admission control based on estimated traffic matrix
Coordinates traffic policing at ingress & egress points for
detecting misbehaving flows
58
ISP 1
Multiple-ISP Scenario
ISP n
Host
Host
ISP 2
ISP m
Ingress Router
Egress Router
IR
IR
ER
ER
Hybrid of flat and hierarchical structures
Local hierarchy within large ISPs
Distribute network state to various CH-nodes and reduces
the amount of state information maintained
Flat structure for peer-to-peer relationships across
independent ISPs
59
Illustration
Host
ISP1
Edge
Router
CH
1
A hierarchy of Logical domains (LDs)
e.g., LD
0
can be a POP or a group of neighboring POPs
CH
o
CH
o
LD
0
LD
1
LD
0
A CH-node is associated with each LD
Maintains resource allocations between ingress-egress pairs
Estimates traffic demand distributions & updates parent CH-nodes
60
Host
ISP1
Edge
Router
CH
1
CH
o
CH
o
LD
0
LD
1
LD
0
Illustration
Parent CH-node
Adapt trunk reservations across LDs for aggregate traffic
within ISP
Peer-Peer
ISP n
Host
ISP m
CH
1
CH
1
Appears flat at the top level
Coordinate peer-to-peer trunk reservations across multiple ISPs
61
Key Design Decisions
Service model: ingress/egress routers as endpoints
IE-Pipe(s,d) = aggregate traffic entering an ISP domain at IR-s,
and exits at ER-d
Reservations set-up for aggregated flows on intra-
and inter-domain links
Adapt dynamically to track traffic fluctuation
Core routers stateless; edge maintain aggregate states
Traffic monitoring, admission control, traffic
policing for individual flows performed at the edge
Access routers have smaller routing tables; experience lower
aggregation of traffic relative to backbone routers
Most congestion (packet loss/delay) happens at edges
62
Traffic-Matrix Admission Control
Mods to edge routers
Traffic monitors passively
measure aggregate rate of
existing flows, M(s,d)
IR-s forwards control messages
(Request/Accept/Reject)
between CH and host/proxy
Estimate traffic demand
distributions, D(s,:), and report
to the CH
POP 1
A
Host Network
IR-s
Host Network
POP 2
ER-d
B
Traffic Monitor
CH
R
new
Accept
or Reject
CH
Leverages knowledge of
topology and traffic matrix to
make admission decisions
63
Group Policing for Malicious Flow
Detection
CH
assigns Fid if the flow is
admitted
Let FidIn = x, FidEg = y
POP 1
A
IR-s
Host Network
POP 2
ER-d
B
CH
TBF Traffic Policer
* Traffic Policer at IR or ER only maintains
total allocated bandwidth to the group
(aggregate state) and not per-flow
reservation status
Update
TBFs
Request
Accept
(with Fid)
TBF for group-x
x y
x a
x b
Traffic Policer at IR-s aggregate flows
based on FidIn for group policing
x y
t y
w y
TBF for group-y
Traffic Policer at ER-d aggregate flows
based on FidEg for group policing