PCN                                                              K. Chan
Internet-Draft                                           Nortel Networks
Intended status: Informational                                 A. Charny
Expires: April 25, 2007                                    Cisco Systems
                                                              P. Eardley
                                                             BT Research
                                                        October 22, 2006


             Pre-Congestion Notification Problem Statement
                  draft-chan-pcn-problem-statement-01

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 25, 2007.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   DiffServ mechanisms have been developed to support Quality of Service
   (QoS).  However, the level of assurance that can be provided with
   DiffServ without substantial over-provisioning is limited.  Pre-
   Congestion Notification (PCN) investigates the use of per-flow
   admission control to provide the required service guarantees for the



Chan, et al.             Expires April 25, 2007                 [Page 1]


Internet-Draft                  Document                    October 2006


   admitted traffic.  While admission control will protect the QoS under
   normal operating conditions, an additional flow pre-emption mechanism
   is necessary in the times of heavy congestion (e.g. caused by route
   changes due to link or node failure).

   This document provides a problem statement on the addition of flow
   admission control and flow pre-emption functionality to a DiffServ
   network, in particular for the support of real time services such as
   voice and video.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Motivation . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.2.  Goals  . . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Architecture and Deployment Scenarios  . . . . . . . . . . . .  5
     2.1.  Functional Architecture  . . . . . . . . . . . . . . . . .  6
     2.2.  Notion of Trust  . . . . . . . . . . . . . . . . . . . . .  7
     2.3.  Deployment Scenarios . . . . . . . . . . . . . . . . . . .  7
   3.  Standards  . . . . . . . . . . . . . . . . . . . . . . . . . .  8
   4.  Assumptions and Constraints on Problem Scope . . . . . . . . .  9
     4.1.  Assumption 1: Controlled Environment . . . . . . . . . . .  9
     4.2.  Assumption 2: Many Flows and Additional Load . . . . . . . 10
     4.3.  Assumption 3: Real-Time Applications . . . . . . . . . . . 10
   5.  Open Design Issues . . . . . . . . . . . . . . . . . . . . . . 11
   6.  Security Implications  . . . . . . . . . . . . . . . . . . . . 12
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 13
   8.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 13
   9.  Informative References . . . . . . . . . . . . . . . . . . . . 13
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15
   Intellectual Property and Copyright Statements . . . . . . . . . . 17



















Chan, et al.             Expires April 25, 2007                 [Page 2]


Internet-Draft                  Document                    October 2006


1.  Introduction

1.1.  Motivation

   IP networks were initially designed to perform per IP packet
   forwarding treatment without discrimination.  With the increased use
   of the IP network by applications with different transport functional
   requirement, the notion of Quality of Service (QoS) was introduced
   [19].

   DiffServ [10] introduced differentiated per packet forwarding
   treatment to provide QoS: some packets are served at a higher
   scheduling priority than others.  Diffserv Service Classes [18]
   categorises various DiffServ traffic and recommends how they can be
   used for packets from applications with different transport
   requirements.  For instance there are Telephony and Real-time
   Interactive service classes.  Applications like these need low loss,
   low delay and low jitter.  A suitable Per Hop Behavior (PHB) is
   Expedited Forwarding (EF) [16], which works by assuring that packets
   (usually) encounter very short or empty queues.  Each router is
   allocated a certain amount of bandwidth for the EF PHB, for instance.
   Excess packets are dropped and delayed, thus leading to poorer QoS
   for an end user running an application like voice-over-IP.  Even if
   average traffic levels are known, due to traffic variations the level
   of assurance that can be provided with DiffServ without substantial
   over-provisioning is limited.

   To help ensure that the average traffic loads remain within the
   allocated bandwidth limits, the DiffServ Architecture [10] introduces
   the idea of policing the amount of traffic in a class as it enters
   the network.  The acceptable traffic level is described by a traffic
   conditioning agreement (TCA).  However, in practice, TCAs police the
   aggregate traffic in a class at the network ingress, and for
   scalability reasons typically includes traffic to different
   destinations.  As a result, TCA's do not guarantee that EF aggregate
   at any given node in the network does not exceed the allocated
   capacity [21], and so don't ensure that a particular end user's QoS
   is guaranteed.  Also, in practice TCAs are static and so require
   accurate and/or conservative prediction of the traffic matrix.

   To cope with the issue of exceeding bandwidth allocation to EF on
   some links, in practice a policer or shaper is assumed to be
   installed at the interior nodes as well.  However, shaping or
   policing traffic causes excess packets be dropped and delayed, thus
   leading to poorer QoS for an end user running an application like
   voice-over-IP.  Even if average traffic levels remain within the
   allocated bandwidth limits, traffic variations may limit the level of
   assurance that can be provided with DiffServ without substantial



Chan, et al.             Expires April 25, 2007                 [Page 3]


Internet-Draft                  Document                    October 2006


   over-provisioning.

   These factors motivate us to work on per flow admission control for a
   DiffServ network, and in particular on measurement-based admission
   control, ie new flow requests are blocked dynamically in response to
   actual (incipient) congestion on a router within the DiffServ
   network.

   However, despite flow admission control, sometimes there can be heavy
   congestion - for example caused by link or node failure that
   effectively reduces the network's capacity.  The default option is
   that the QoS of all flows is degraded.  However, by pre-empting some
   flows the QoS of the remaining flows can be protected.  The work
   reported in [7] indicates that in the context where calls have
   different recongizable precedence levels (e.g. in the context of
   military/emergency calls [20]), this problem can be partially
   addressed by dropping lower-precedence calls preferentially while
   protecting higher precedence calls.  However, as it was shown in [6],
   the need to pre-empt some flows of a given precedence level, while
   protecting the QoS of the rest of the flows of this precedence level
   remains.

   This motivates us to work on per flow pre-emption for a DiffServ
   network, and in particular on measurement-based pre-emption, ie
   existing flows are dropped dynamically in response to actual
   congestion on a router within the DiffServ network.

   Explicit Congestion Notification (ECN) [15] introduced the idea of a
   router indicating that it is congested by changing the header of
   packets ("marking" them).  However, ECN in RFC3168 [15] is designed
   for TCP applications.  This motivates us to develop the concept for
   real-time applications.  A router "PCN-marks" packets as an early
   warning of its incipient congestion ("pre-congestion").  These
   markings are then used by the admission control and pre-emption
   mechanisms.

   The rest of this document discusses our proposed goals, assumptions
   and some functional architecture directions.

1.2.  Goals

   From the functional standpoint, the goal of the proposed PCN approach
   is twofold:

   o  Flow Admission Control: block admission of new flows as soon as
      signs of incipient congestion are detected, to prevent congestion
      / overload.




Chan, et al.             Expires April 25, 2007                 [Page 4]


Internet-Draft                  Document                    October 2006


   o  Flow Pre-emption: If traffic exceeds the desired/allocated
      capacity (e.g. due to a failure), pre-empt sufficient flows so
      that the QoS of the remaining flows is protected.

   The following are proposed as design goals:

   o  The PCN-enabled packet forwarding network should be simple,
      scalable and robust

   o  Compatibility with other traffic (i.e. a proposed solution should
      work well when non-PCN traffic is also present in the network)

   o  Support of different types of real-time traffic (eg should work
      well with CBR and VBR voice and video sources)

   o  Reaction time of the mechanisms should be commensurate with the
      desired application-level requirements (e.g. a pre-emption
      mechanism needs to pre-empt flows before significant QoS issues
      are experienced by all real-time traffic, and before a user hangs
      up)

   o  Compatibility with different precedence levels of real-time
      applications (e.g. preferential treatment of higher precedence
      calls over lower precedence calls, MLPP [20].


2.  Architecture and Deployment Scenarios

   The above goals point to a high-level approach where functionality is
   split between:

   o  Nodes in the PCN-enabled network, which monitor their own state of
      (pre) congestion and mark packets if appropriate

   o  Nodes at the edge of the PCN-enabled network, which control
      admission of new flows and pre-emption of existing flows, based on
      information from nodes in the network.  This information is in the
      form of the marked packets and not explicit signalling messages.

   The aim of this split is to keep the bulk of the network simple,
   scalable and robust, whilst confining policy, application-level and
   security interactions to the edge of the PCN network.

   Section 2.1 provides a high-level description of the functional
   architecture, and Section 2.2 considers some possible deployment
   scenarios.





Chan, et al.             Expires April 25, 2007                 [Page 5]


Internet-Draft                  Document                    October 2006


2.1.  Functional Architecture

   Figure 1 shows a schematic diagram of the high-level functional
   architecture:

                         +------------------------------------+
                         |            PCN-Region              |
                         +------+       +------+       +------+
                         |      |       |      |       |      |
                         |PEN A | ----> |PIN A | ----> |PEN B |
                         |      |       |      |       |      |
                         +------+       +------+       +------+
                         |                                    |
                         +------------------------------------+


                Figure 1: PCN-based Functional Architecture

   The terms are defined as follows:

   PCN-Region:

         A DiffServ region of the Internet running PCN, that is the PCN-
         based mechanisms are used to decide whether to admit a new flow
         to the DiffServ region and whether to pre-empt an existing
         flow.  All traffic enters/leaves the PCN-Region through a PCN
         End Node.  Please note that the PCN-Region is also defined by
         the Diffserv Service Class [18] that is subject to the PCN
         mechanisms.

   PCN Interior Node (PIN) (function):

         The PCN Interior Node is an "on-path" function.  It performs
         traffic metering and PCN-marking: the function that enables a
         network element to give an early warning of its own incipient
         congestion ("pre-congestion") on one of its interfaces, ie
         traffic is above a certain level, by marking, e.g. changing the
         header of packet(s).

   PCN End Node (PEN) (function):

         The PCN End Node is an "on-path" function.  The PCN End Node is
         where the PCN Region ends.  It indicates the significance of
         the PCN packet marking which terminates at this functional
         node.  This functional description does not imply which
         physical device will implement this function (e.g., edge
         router, media gateway or end-host).  This "on-path" function
         performs the detection of PCN-marks: the function that monitors



Chan, et al.             Expires April 25, 2007                 [Page 6]


Internet-Draft                  Document                    October 2006


         PCN-marking to obtain on-path congestion information as
         signaled through PCN-marking by PCN-enabled Interior Nodes.
         For PCN's purpose, these actions may include but not be limited
         to:

         +  Make Flow Admission Control and/or Flow Pre-emption
            decisions.

         +  Signalling the PCN information to others for making the Flow
            Admission Control and/or Flow Pre-emption decisions.

         +  Perform measurement of marked packets across multiple IP
            packets of a flow to derive network information for a flow
            that a single packet can not provide.

         +  Perform measurement of marked packets across multiple IP
            flows to derive additional network information.

2.2.  Notion of Trust

   With the above Functional Architecture, there exists a notion of
   trust between the different functional elements:

   o  PENs trusting PINs to provide the correct network information.

   o  PINs trusting PENs that admission control and pre-emption will be
      administered correctly so the PINs will not be over-whelmed with
      traffic.

   o  Users/Applications trusting the PENs that they will provide
      dependable informations for taking application actions.

   o  PENs trusting other PENs that when one PEN performs its task of
      flow admission control, other PENs will also perform their flow
      admission control actions.  So that the "good citizens" does not
      get penelized.

   We discuss some notion of trust further in section 4.1 Assumption 1:
   Controlled Environment and in section 6 Security Implications.

2.3.  Deployment Scenarios

   The previous section describes the functional architecture.  The
   association of these functions to physical devices may depend on the
   deployment scenario.  We make some general comments about the
   physical devices where the functions above will typically reside:





Chan, et al.             Expires April 25, 2007                 [Page 7]


Internet-Draft                  Document                    October 2006


   o  The PCN Interior Node function typically resides in a network
      element like a router or a switch where packet forwarding is
      handled.

   o  The PCN End Node function typically resides in a router, but may
      also be on a host or a proxy.  It is typically the closest PCN-
      enabled device to the user.

   Operators of networks will want to use the PCN functions (and
   standards) in various arrangements, for instance depending on how
   they are performing admission control outside the PCN-region, their
   goals beyond those in Section 1.2, and assumptions in addition to
   those in Section 4.

   Hence we shall work on several deployment scenarios.  Initially we
   have the following possibilities in mind:

   o  IntServ over DiffServ [14], the DiffServ region is PCN-enabled.
      This is described in CL Architecture [2].

   o  SIP-controlled Admission and Pre-emption: trusted SIP endpoints
      (gateway or host) perform application flow admission and flow pre-
      emption, based on network information provided by PCN marking.
      This is described in SIP Controlled Admission and Preemption [4].

   o  Pseudowire: PCN may be used as a congestion avoidance mechanism
      for end-user deployed pseudowires (collaborate with the PWE3 WG in
      investigation of this possibility).


3.  Standards

   To solve the PCN functionality described above, we will work on
   developing a standard for each of the following problems:

   o  How should the measurement of pre-congestion be done at the PINs?
      For determining when an interior node should mark a packet in
      order to give early warning of its own congestion?  Should there
      be a standardized algorithm?  Or just the required behavior should
      be standardized?

   o  How should such a mark be encoded by the PINs in a packet (in the
      ECN and/or DSCP fields)?

   o  How should these markings (at packet granularity) be interpreted
      by the PENs for making flow admission control and flow pre-emption
      decisions (at flow granularity)?




Chan, et al.             Expires April 25, 2007                 [Page 8]


Internet-Draft                  Document                    October 2006


   Initial work addressing these questions has been reported to the IETF
   in CL Architecture [2], RT ECN [1], NSIS RMD [5].  Note that other
   options are possible.

   One of the key questions that need to be answered in the context of
   standardisation is, what level of detail of standardisation is
   appropriate for the first bullet?  For example, should PCN be
   specified as an algorithm relating the probability of PCN-marking a
   packet to (some specific description of the) traffic level?  Or
   something more detailed (e.g. implementation specifics) or less
   detailed (describe the behaviour in more general terms than an
   algorithm).  We want flexibility, but also want to be sure that
   different standards-compliant implementations will work together.

   A similar issue arises for the third bullet.  Additionally, it might
   be possible to specify more than one way of reacting to the PCN-
   markings.  On the plus side, different reaction behaviours may be
   more suited to different deployment scenarios.  But this could
   require coordination of the PCN End Nodes for a particular PCN-
   region, so they agreed to use the same reaction behaviour.

   On the second bullet, CL PHB [3] has some options for how to do the
   encoding, focussed on use of the ECN field, and an initial analysis
   of their pros and cons.  Another possibility is to use the DSCP
   field, as in NSIS RMD [5], or a combination of the two.  The WG will
   study the trade-offs between different encoding options.


4.  Assumptions and Constraints on Problem Scope

   In order to make rapid progress, initially we will restrict the
   problem space in several ways.  NOTE: Subsequent re-chartering may
   investigate solutions for when some of these restrictions are not in
   place.  The working assumption is that the standards developed in the
   initial phase should not need to be modified to satisfy the solutions
   for when these restrictions are removed.

4.1.  Assumption 1: Controlled Environment

   We assume that the PCN-enabled Internet Region is a controlled
   environment, i.e. all the interior and end nodes of the region run
   PCN and trust each other.

   There are several reasons for proposing this assumption:

   o  The PCN-Region has to be fully encircled by a ring of PCN End
      Nodes, otherwise packets could enter the PCN-Region without being
      subject to admission control, which would potentially destroy the



Chan, et al.             Expires April 25, 2007                 [Page 9]


Internet-Draft                  Document                    October 2006


      QoS of existing flows.

   o  Similarly, a PCN End Node has to trust that all the interior
      routers are doing PCN-marking.  A non-PCN router won't be able to
      alert that it's suffering pre-congestion, which potentially would
      lead to too many calls being admitted (or too few being pre-
      empted).  Worse, a rogue router could perform attacks such as
      marking all packets so that no flows were admitted.

   One way of assuring the above two points is that the entire PCN-
   region is run by a single operator.  Another possibility is that
   there are several operators but they trust each other to a sufficient
   level.  Please note that this restriction applies to packets in the
   traffic class that is subject to the PCN mechanisms.

4.2.  Assumption 2: Many Flows and Additional Load

   We assume that there are many flows on any bottleneck link in the
   PCN-enabled region.

   Measurement-based admission control assumes that the past is a
   reasonable reflection of the future: the network conditions are
   measured at the time of a new flow request, however the actual
   network performance must be OK during the call some time later.

   One issue is that if there are only a few variable rate flows, then
   the aggregate traffic level may vary a lot, perhaps enough to cause
   some packets to get dropped.  If there are many flows then the
   aggregate traffic level should be statistically smoothed.  How many
   flows is enough depends on a number of things such as the variation
   in each flow's rate, the total PCN bandwidth, and the size of the
   "safety margin" between the traffic level at which we start PCN-
   marking and at which packets are dropped.

4.3.  Assumption 3: Real-Time Applications

   We assume that packets come from real time applications generating
   inelastic traffic like voice and video requiring low delay, jitter
   and packet loss, i.e. as defined by the Controlled Load Service [9].

   This assumption is to help focus the effort where it looks like PCN
   would be most useful, ie the sorts of applications where per flow QoS
   is a known requirement.  For instance, the impact of this assumption
   would be to guide simulations work.  NOTE: PCN should be readily
   extendible to other applications like ones that typically use Assured
   Forwarding [12].





Chan, et al.             Expires April 25, 2007                [Page 10]


Internet-Draft                  Document                    October 2006


5.  Open Design Issues

   Whilst working on the general issues of flow admission control and
   flow pre-emption, we have found several issues that proved hard to
   solve.  They are briefly documented here - further details are in
   [2].  In general they seem to be characteristics of most measurement-
   based admission control schemes, but some may not be relevant to
   particular deployment scenarios.  From the perspective of this
   problem statement, besides just noting the issue the PCN WG could:

   o  Upgrade the issue, so it's added to the "Goals" section earlier,
      or to the "Assumptions" section as appropriate

   o  Downgrade the issue, either because it isn't that important or
      because it's better dealt with outside the PCN solution

   o  Wait and see, ie as the PCN solution is developed assess how much
      extra complexity solving the issue would add

   The comments below are about admission control, but generally a
   similar issue arises for flow pre-emption.

   ECMP (Equal Cost Multi-Path) Routing:

         In order to decide whether to admit a new flow, the CL
         Architecture [2] scheme determines what the ingress and egress
         PENs would be and measures the current level of PCN-marking
         between them (Congestion-Level-Estimate).  If routers in the
         PCN-region run ECMP, then traffic between a particular pair of
         PENs may follow several different paths.  The problem is that
         if just one of the paths is congested such that packets are
         being PCN-marked, then the Congestion-Level-Estimate measured
         by the egress PEN will be diluted by unmarked packets from
         other non-congested paths.

   Bi-Directional Sessions:

         CL Architecture [2] describes a flow admission control
         mechanism.  However, from the application perspective, for a
         bi-directional session the two flows should be admitted as a
         pair - for instance a bi-directional voice call only makes
         sense if flows in both directions are admitted.

   Global Coordination:

         CL Architecture [2] makes its admission decision based on PCN-
         markings between a particular pair of PENs.  Decisions about
         flows through a different pair of PENs are made independently.



Chan, et al.             Expires April 25, 2007                [Page 11]


Internet-Draft                  Document                    October 2006


         However, one can imagine network topologies and traffic
         matrices where from a global perspective it would be better to
         make a coordinated decision across all the pairs of PENs for
         the whole PCN-region.  For example, to block (or even pre-empt)
         flows on one PEN pair so that more important flows through a
         different pair could be admitted.

   Aggregate Traffic Characteristics:

         Even when the number of flows is stable, the traffic level
         through the PCN-region will vary because the sources vary their
         traffic rates.  The CL Architecture [2] mechanism works best
         when there's "some" variability in the total traffic level at a
         router's interface (ie in the aggregate traffic from all
         sources).  Too much variation means that a router may (at one
         moment) not be doing any PCN-marking and then (at another
         moment) be overloaded, ie drop packets.  This makes it hard to
         tune the admission control scheme to stop admitting new flows
         at the right time.  However, too little variation can also be a
         problem.  For example, if all the sources are constant bit rate
         and are synchronised, then the total traffic level at a
         router's interface could be (almost) at its capacity and all
         packets could still be serviced instantly.  However, admitting
         one more flow could tip the router over its capacity, so its
         queue grew indefinitely until it had to drop packets.  "Some"
         traffic variation means that as the traffic level nears the
         capacity limit, some packets are PCN-marked but there's still
         enough capacity to cope with the traffic fluctuations.  Hence
         new flows can be blocked and packets are never dropped.

   Speed of Reaction:

         The CL Architecture [2] mechanism has a limited speed of
         reaction: if a big burst of admission requests occurs in a very
         short space of time (eg prompted by a televote), they could all
         get admitted before enough PCN-marks are seen to block new
         flows.  In other words, any additional load offered within the
         reaction time of the mechanism mustn't move the CL-Region
         directly from no congestion to overload.


6.  Security Implications

   Packets from normal precedence and higher precedence sessions [20]
   aren't distinguishable by PCN Interior Nodes.  This prevents an
   attacker specifically targeting, in the data plane, higher precedence
   packets (perhaps for DoS or for eavesdropping).  However, PCN End
   Nodes can access this information to help decide whether to admit or



Chan, et al.             Expires April 25, 2007                [Page 12]


Internet-Draft                  Document                    October 2006


   pre-empt a flow.  The separation of network information provided by
   the Interior Nodes and the precedence information at the PCN End
   Nodes allows simpler, easier and better focused security enforcement.

   PCN End Nodes police packets to ensure a flow sticks within its
   agreed limit.  This is similar to the existing IntServ behaviour.
   Between them the PCN End Nodes must fully encircle the PCN-Region,
   otherwise packets could enter the PCN-Region without being subject to
   admission control, which would potentially destroy the QoS of
   existing flows.

   It is assumed that all the Interior Nodes and PCN End Nodes run PCN
   and trust each other (ie the PCN-enabled Internet Region is a
   controlled environment).  For instance a non-PCN router wouldn't be
   able to alert that it's suffering pre-congestion, which potentially
   would lead to too many calls being admitted (or too few being pre-
   empted).  Worse, a rogue router could perform attacks such as marking
   all packets so that no flows were admitted.

   So security requirements are focussed at specific parts of the PCN-
   Region:

      The PCN End Nodes become the trust points.  The degree of trust
      required depends on the kinds of decisions it has to make and the
      kinds of information it needs to make them.  For example when the
      PCN End Node needs to know the contents of the sessions for making
      the decisions, when the contents are highly classified, the
      security requirements for the PCN End Nodes involved will also
      need to be high.

      PCN-marking by the Interior Nodes along the packet forwarding path
      needs to be trusted, because the PCN End Nodes rely on this
      information.


7.  IANA Considerations

   To be completed.


8.  Acknowledgements

   To be completed.


9.  Informative References

   [1]   Babiarz, J., "Congestion Notification Process for Real-Time



Chan, et al.             Expires April 25, 2007                [Page 13]


Internet-Draft                  Document                    October 2006


         Traffic", draft-babiarz-tsvwg-rtecn-05 (work in progress),
         October 2005.

   [2]   Briscoe, B., "An edge-to-edge Deployment Model for Pre-
         Congestion Notification: Admission  Control over a DiffServ
         Region", draft-briscoe-tsvwg-cl-architecture-03 (work in
         progress), June 2006.

   [3]   Briscoe, B., "Pre-Congestion Notification marking",
         draft-briscoe-tsvwg-cl-phb-03 (work in progress), October 2006.

   [4]   Babiarz, J., "SIP Controlled Admission and Preemption",
         draft-babiarz-pcn-sip-cap-00 (work in progress), October 2006.

   [5]   Bader, A., "RMD-QOSM - The Resource Management in Diffserv QOS
         Model", draft-ietf-nsis-rmd-08 (work in progress),
         October 2006.

   [6]   Baker, F. and J. Polk, "MLEF Without Capacity Admission Does
         Not Satisfy MLPP Requirements",
         draft-ietf-tsvwg-mlef-concerns-00 (work in progress),
         February 2005.

   [7]   Silverman, S., "Multi-Level Expedited Forwarding Per Hop
         Behavior (MLEF PHB)", draft-silverman-tsvwg-mlefphb-03 (work in
         progress), October 2005.

   [8]   Braden, B., Clark, D., and S. Shenker, "Integrated Services in
         the Internet Architecture: an Overview", RFC 1633, June 1994.

   [9]   Wroclawski, J., "Specification of the Controlled-Load Network
         Element Service", RFC 2211, September 1997.

   [10]  Nichols, K., Blake, S., Baker, F., and D. Black, "Definition of
         the Differentiated Services Field (DS Field) in the IPv4 and
         IPv6 Headers", RFC 2474, December 1998.

   [11]  Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., and W.
         Weiss, "An Architecture for Differentiated Services", RFC 2475,
         December 1998.

   [12]  Heinanen, J., Baker, F., Weiss, W., and J. Wroclawski, "Assured
         Forwarding PHB Group", RFC 2597, June 1999.

   [13]  Awduche, D., Malcolm, J., Agogbua, J., O'Dell, M., and J.
         McManus, "Requirements for Traffic Engineering Over MPLS",
         RFC 2702, September 1999.




Chan, et al.             Expires April 25, 2007                [Page 14]


Internet-Draft                  Document                    October 2006


   [14]  Bernet, Y., Ford, P., Yavatkar, R., Baker, F., Zhang, L.,
         Speer, M., Braden, R., Davie, B., Wroclawski, J., and E.
         Felstaine, "A Framework for Integrated Services Operation over
         Diffserv Networks", RFC 2998, November 2000.

   [15]  Ramakrishnan, K., Floyd, S., and D. Black, "The Addition of
         Explicit Congestion Notification (ECN) to IP", RFC 3168,
         September 2001.

   [16]  Davie, B., Charny, A., Bennet, J., Benson, K., Le Boudec, J.,
         Courtney, W., Davari, S., Firoiu, V., and D. Stiliadis, "An
         Expedited Forwarding PHB (Per-Hop Behavior)", RFC 3246,
         March 2002.

   [17]  Charny, A., Bennet, J., Benson, K., Boudec, J., Chiu, A.,
         Courtney, W., Davari, S., Firoiu, V., Kalmanek, C., and K.
         Ramakrishnan, "Supplemental Information for the New Definition
         of the EF PHB (Expedited Forwarding Per-Hop Behavior)",
         RFC 3247, March 2002.

   [18]  Babiarz, J., Chan, K., and F. Baker, "Configuration Guidelines
         for DiffServ Service Classes", RFC 4594, August 2006.

   [19]  "Supporting Real-Time Applications in an Integrated Services
         Packet Network: Architecture and Mechanisms", Proceedings of
         SIGCOMM '92 at Baltimore MD, August 1992.

   [20]  "Multilevel Precedence and Pre-emption Service (MLPP)", ITU-T
         Recommendation I.255.3, 1990.

   [21]  "Economics and Scalability of QoS Solutions", BT Technology
         Journal Vol 23 No 2, April 2005.

   [22]  Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S.,
         Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge,
         C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski,
         J., and L. Zhang, "Recommendations on Queue Management and
         Congestion Avoidance in the Internet", RFC 2309, April 1998.













Chan, et al.             Expires April 25, 2007                [Page 15]


Internet-Draft                  Document                    October 2006


Authors' Addresses

   Kwok Ho Chan
   Nortel Networks
   600 Technology Park Drive
   Billerica, MA  01821
   USA

   Email: khchan@nortel.com


   Anna Charny
   Cisco Systems
   14164 Massachusetts Ave
   Boxborough, MA  01719
   USA

   Email: acharny@cisco.com


   Philip Eardley
   BT Research
   B54/77, Sirius House Adastral Park Martlesham Heath
   Ipswich, Suffolk  IP5 3RE
   United Kingdom

   Email: philip.eardley@bt.com
























Chan, et al.             Expires April 25, 2007                [Page 16]


Internet-Draft                  Document                    October 2006


Full Copyright Statement

   Copyright (C) The Internet Society (2006).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Chan, et al.             Expires April 25, 2007                [Page 17]